{"id":"https://openalex.org/W4401389565","doi":"https://doi.org/10.1145/3670243.3673882","title":"Proactive Curriculum for Cyber Security Education: A Model of Micro-Credentials and Active Blended Learning","display_name":"Proactive Curriculum for Cyber Security Education: A Model of Micro-Credentials and Active Blended Learning","publication_year":2024,"publication_date":"2024-08-07","ids":{"openalex":"https://openalex.org/W4401389565","doi":"https://doi.org/10.1145/3670243.3673882"},"language":"en","primary_location":{"id":"doi:10.1145/3670243.3673882","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3670243.3673882","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3670243.3673882?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Central and Eastern European eDem and eGov Days 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3670243.3673882?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009800857","display_name":"Gregor Eibl","orcid":"https://orcid.org/0000-0001-7201-6034"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gregor Eibl","raw_affiliation_strings":["Department for E-Governance and Administration, University of Continuing Education Krems, Austria"],"raw_orcid":"https://orcid.org/0000-0001-7201-6034","affiliations":[{"raw_affiliation_string":"Department for E-Governance and Administration, University of Continuing Education Krems, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097138525","display_name":"Christoph Jungbauer","orcid":"https://orcid.org/0009-0003-1387-5500"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christoph Jungbauer","raw_affiliation_strings":["Multimedia Information Systems, University of Vienna, Austria"],"raw_orcid":"https://orcid.org/0009-0003-1387-5500","affiliations":[{"raw_affiliation_string":"Multimedia Information Systems, University of Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028061184","display_name":"Olga Litvyak","orcid":"https://orcid.org/0000-0002-1277-827X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olga Litvyak","raw_affiliation_strings":["Department for E-Governance and Administration, University of Continuing Education Krems, Austria"],"raw_orcid":"https://orcid.org/0000-0002-1277-827X","affiliations":[{"raw_affiliation_string":"Department for E-Governance and Administration, University of Continuing Education Krems, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106345739","display_name":"Peter Volkl","orcid":"https://orcid.org/0000-0002-9262-9740"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peter Volkl","raw_affiliation_strings":["Department of Information Systems Management, Ferdinand Porsche FernFH, Austria"],"raw_orcid":"https://orcid.org/0000-0002-9262-9740","affiliations":[{"raw_affiliation_string":"Department of Information Systems Management, Ferdinand Porsche FernFH, Austria","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083300097","display_name":"Christian Luidold","orcid":"https://orcid.org/0000-0001-6508-5787"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Luidold","raw_affiliation_strings":["Multimedia Information Systems, University of Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0001-6508-5787","affiliations":[{"raw_affiliation_string":"Multimedia Information Systems, University of Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5009800857"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.746,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77096148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"234","last_page":"239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13034","display_name":"Information Systems Education and Curriculum Development","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6347931623458862},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.5627951622009277},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5322371125221252},{"id":"https://openalex.org/keywords/blended-learning","display_name":"Blended learning","score":0.4153040647506714},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3361416459083557},{"id":"https://openalex.org/keywords/mathematics-education","display_name":"Mathematics education","score":0.26423484086990356},{"id":"https://openalex.org/keywords/educational-technology","display_name":"Educational technology","score":0.2034980058670044},{"id":"https://openalex.org/keywords/pedagogy","display_name":"Pedagogy","score":0.12470009922981262},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0783301293849945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6347931623458862},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.5627951622009277},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5322371125221252},{"id":"https://openalex.org/C158592959","wikidata":"https://www.wikidata.org/wiki/Q869010","display_name":"Blended learning","level":3,"score":0.4153040647506714},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3361416459083557},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.26423484086990356},{"id":"https://openalex.org/C16443162","wikidata":"https://www.wikidata.org/wiki/Q1068473","display_name":"Educational technology","level":2,"score":0.2034980058670044},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.12470009922981262},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0783301293849945}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3670243.3673882","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3670243.3673882","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3670243.3673882?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Central and Eastern European eDem and eGov Days 2024","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3670243.3673882","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3670243.3673882","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3670243.3673882?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Central and Eastern European eDem and eGov Days 2024","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320324004","display_name":"Forskningsr\u00e5det om H\u00e4lsa, Arbetsliv och V\u00e4lf\u00e4rd","ror":"https://ror.org/02d290r06"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401389565.pdf","grobid_xml":"https://content.openalex.org/works/W4401389565.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W644479987","https://openalex.org/W1463266149","https://openalex.org/W1491902629","https://openalex.org/W2002249844","https://openalex.org/W2134512579","https://openalex.org/W2573238055","https://openalex.org/W2591304547","https://openalex.org/W2613646090","https://openalex.org/W2753225097","https://openalex.org/W2784846085","https://openalex.org/W2910239048","https://openalex.org/W2982205235","https://openalex.org/W3043379545","https://openalex.org/W3044848760","https://openalex.org/W3092984482","https://openalex.org/W3108634919","https://openalex.org/W3130705826","https://openalex.org/W3198863209","https://openalex.org/W4224091938","https://openalex.org/W4226437737","https://openalex.org/W4247390893","https://openalex.org/W4287150833"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2253008778","https://openalex.org/W1821769140","https://openalex.org/W2581986675","https://openalex.org/W2266588008","https://openalex.org/W3082452733","https://openalex.org/W2255749340","https://openalex.org/W2891384032","https://openalex.org/W2390279801"],"abstract_inverted_index":{"The":[0,13,113],"landscape":[1],"of":[2,23,110,119,144],"cyber-attacks":[3],"is":[4,116],"rapidly":[5],"evolving":[6],"and":[7,11,34,43,69,74,80,104,128,136],"increasing":[8],"in":[9,106],"variety":[10],"frequency.":[12],"demand":[14],"for":[15,30,89],"cyber":[16,111],"security":[17],"expertise,":[18],"coupled":[19],"with":[20,98],"a":[21,51,86],"shortage":[22],"qualified":[24],"professionals,":[25],"underscores":[26],"the":[27,40,99,107,138,141,145],"urgent":[28],"need":[29],"comprehensive":[31],"training":[32],"programs":[33],"curriculum":[35,56],"development.":[36],"This":[37,83],"paper":[38],"identifies":[39],"resulting":[41],"needs":[42],"describes":[44],"how":[45,120],"they":[46],"can":[47,131],"be":[48,63],"translated":[49],"into":[50],"highly":[52],"adaptive":[53],"approach":[54,84,139],"to":[55,62,66,94,102],"design":[57],"that":[58],"allows":[59],"cybersecurity":[60,134],"education":[61,135],"more":[64],"responsive":[65],"ever-changing":[67],"threats":[68],"countermeasures":[70],"through":[71,140],"an":[72,117],"activity":[73],"problem-based":[75],"paradigm":[76],"based":[77],"on":[78],"micro-credentials":[79],"flexible":[81],"delivery.":[82],"provides":[85],"valuable":[87],"model":[88],"other":[90],"educational":[91,122],"institutions":[92],"seeking":[93],"provide":[95],"their":[96],"students":[97],"necessary":[100],"skills":[101],"navigate":[103],"succeed":[105],"complex":[108],"field":[109],"security.":[112],"SHIFT":[114],"project":[115],"example":[118],"targeted":[121],"strategies,":[123],"supported":[124],"by":[125],"robust":[126],"research":[127],"industry":[129],"collaboration,":[130],"significantly":[132],"improve":[133],"illustrates":[137],"current":[142],"implementation":[143],"concept":[146],"at":[147],"Ferdinand":[148],"Porsche":[149],"FERNFH.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
