<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Human Rights education as a Component of the European Union cybersecurity curricula</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maria Teresa Baldassarre</string-name>
          <email>mariateresa.baldassarre@uniba.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Berenice Fernández Nieto</string-name>
          <email>b.fernandeznieto@studenti.uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Azzurra Ragone</string-name>
          <email>azzurra.ragone@uniba.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Scuola IMT Alti Studi Lucca</institution>
          ,
          <addr-line>Piazza S.Francesco, 19, 55100 Lucca LU</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Università degli Studi di Bari</institution>
          ,
          <addr-line>Via Edoardo Orabona, 4, 70125 Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The training of professionals in the field of cybersecurity is a pressing need that multiple countries are working to meet. Currently, most of curricula place a significant emphasis on technical, economic, legal, and national security concerns. Nevertheless, it is essential to incorporate a human-centered approach that brings the social dimension into cybersecurity education plans and highlights the relevance of preserving human and digital rights in an era of constant and rapid change. To this end, this paper seeks to diagnose the current state of the curricula in the field of cybersecurity to identify trends in the training profiles and knowledge gaps regarding human rights formation. Cybersecurity education, human rights, digital rights, Human-centered cybersecurity construction and defense of a universal culture of human rights in society, as well as the promotion and protection of fundamental freedoms [3]. As a result, this responsibility must prevail in the cybersecurity field.</p>
      </abstract>
      <kwd-group>
        <kwd>the training and awareness of professionals with knowledge</kwd>
        <kwd>skills</kwd>
        <kwd>and behaviors that contribute to the</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Training cybersecurity professionals is a critical global need as cybersecurity threats increase in
frequency and complexity. According to data for 2022, the economic impact of cyber-attacks on the
private sector was at least USD 100,000 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Meanwhile, a 2019 survey of cybersecurity professionals
in Europe revealed a shortage of approximately 291,000 professionals, a significant increase from the
previous year when the demand for professional staff was estimated at 142,000 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>While the professional field of cybersecurity is expanding, it demands holistic and multidisciplinary
approaches that consider the social impact of technologies and the potential risks of activities that
protect and regulate cyberspace. Protecting cyberspace entails more than just safeguarding information
systems; it also entails ensuring that individuals' rights are upheld. As in the case of facial recognition
technologies, there are several cases where new protection measures violate the rights of specific
populations. Events like these highlight the importance of a comprehensive profile capable of
developing safeguards for individuals' rights.</p>
      <p>According to the Council of Europe and the Charter on Education for Democratic Citizenship and</p>
      <p>2020 Copyright for this paper by its authors.
dominant orientation. In addition, a survey of education professionals, institutions, and centers will be
conducted to ascertain their perspectives on the need for a human-centered approach to cybersecurity
expert training. This research is motivated by the need to bridge the gap between the growing demand
for cybersecurity professionals and the need to emphasize human rights education.</p>
      <p>The paper is organized as follows: Section 2 explains the different dimensions of the problems,
boundaries, and challenges; Section 3 describes the Research Questions (RQs) and the methodology we
will follow to answer these RQs; Section 4 highlights the goals and objectives we want to pursue in this
systematic study.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Human Rights in cybersecurity curricula</title>
      <p>
        Awareness of human rights tends to be addressed superficially within cybersecurity curriculums.
Currently, and in light of the proliferation of educational programs, it is essential to open spaces for
training on human and digital rights. We must acknowledge that human rights are universal and inherent
in all people, regardless of gender, nationality, ethnicity, religion, or language [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], and nowadays, they
are also exercised by digital means.
      </p>
      <p>
        New technologies are relevant to human rights, and it has been acknowledged that they amplify their
reach and exercise; consequently, all activity aimed at regulating and protecting cyberspace has an
inescapable effect on human rights. It is important to note that there are also rights that depend heavily
on the internet as the "digital rights," which are the result of technology-enabled ways to be and act.
Digital rights include rights such as freedom of expression, access to information, privacy, equality,
inclusion, and non-discrimination, among others [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In this scenario, it is worth re-considering a contentious issue within security studies: security for
whom? This question invites us to reflect on who we consider when discussing cybersecurity. In the
educational-training field of cybersecurity, we need to examine to which extent it has incorporated a
human-centered perspective or if we are only looking at the systems [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The exercise is urgent since
the absence of a human rights focus risks training professionals unaware of digital activities' impact on
people and vulnerable populations and how people's rights are currently violated in authoritarian
regimes in the name of security[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        In this scenario, it is worth re-considering a contentious issue within security studies: security for
whom? This question invites us to reflect on who we consider when discussing security. In the
educational-training field of cybersecurity, we need to examine to which extent it has incorporated a
human-centered perspective or if we are only looking at the systems. The exercise is urgent since the
absence of a human rights focus risks training professionals unaware of digital activities' impact on
people and vulnerable populations and how people's rights are currently violated in authoritarian
regimes in the name of security [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        In 2022 the European Union Agency for Cybersecurity (ENISA) published a paper identifying the
training plans for cybersecurity professionals in European Union. Italy, Greece, the Czech Republic,
Spain, Ireland, the Netherlands, Luxembourg, Malta, Estonia, France, Slovenia, Portugal, Austria, and
Switzerland are among the countries on the list [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. ENISA figures also show a steady increase in
cybersecurity programs (see graph below).
      </p>
      <p>
        The identified initiatives include ethical hacking challenges, training, and awareness platforms.
Other studies, for example, Martti Lehto [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], examines national cybersecurity programs in Finland.
The findings highlight the crucial role of cybersecurity research and development (R&amp;D) and education
in bolstering Finland's information security. At the regional level, a survey conducted by Blažič in 2021
identified skill gaps in cybersecurity education among higher education institutions in the European
Union. This technical-focused analysis shed light on the educational requirements in various areas,
including cryptography, networking, secure coding principles, operating system internals, proficiency
with Linux-based systems, and more [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>While informative and valuable, the analyses above primarily concentrate on technical skills within
cybersecurity education at various educational levels. The social dimension, which encompasses
broader aspects such as human behavior, ethics, legal frameworks, and social implications, has not been
extensively addressed. Hence, there is a need to ensure a comprehensive and holistic approach to
cybersecurity training.</p>
      <p>
        The debate around human rights is unfolding on the theoretical side, where several analyses discuss
the importance of finding a balance between cybersecurity and individual freedoms. Taddeo, for
example, describes this equilibrium as "the struggle between liberties and authorities"[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Pagallo
presents another study from the legal sphere, stating that "at least in Western legal systems, it should
be clear that either civil rights prevail over cybersecurity (no balancing), or such balance has to
satisfactorily protect individual rights (proportionality)" [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Pavlova also emphasizes the need for a
human rights-based approach in cybersecurity and explores the apparent tradeoffs of sacrificing
freedoms and rights for security. Her analysis calls for greater awareness and skill development to
establish cybersecurity's human rights standards [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>Most of the above-mentioned literature demonstrates the coexistence of two parallel approaches. On
the one hand, there is a recognized need to develop and equip professionals in the field and meet the
growing demand. On the other hand, there is an urgency to incorporate human rights approaches within
cybersecurity. However, analyses that effectively converge these two needs are relatively scarce. This
situation invites further exploration into a people-centered educational vision. Such an approach would
emphasize the significance of not only technical expertise but also an understanding of the ethical, legal,
and societal dimensions of cybersecurity.</p>
      <p>In view of the aforesaid, our analysis aims to contribute to ongoing efforts to foster a people-centered
perspective by raising awareness among cybersecurity students and practitioners, who will ultimately
protect cyberspace in the coming years and recalibrate the direction towards a more human rights-based
approach.</p>
    </sec>
    <sec id="sec-3">
      <title>3. RQs and Methodology</title>
      <p>The Research Questions (RQs) guiding the present proposal are: (RQ1) What is the state of the art
of cybersecurity education programs in the European Union (EU)? (RQ2) Which perspectives
dominate the content of these programs? and (RQ3) How do education professionals, institutions, and
centers perceive the necessity of a human-centered approach to training cybersecurity experts?</p>
      <p>To answer the above-mentioned questions, we will adopt a mixed-methods approach that integrates
qualitative and quantitative data collection and analysis techniques to address these inquiries. Our
proposed methodology entails mapping cybersecurity programs and conducting a comparative analysis
using documentary evidence. The methodology will be guided by Cambridge Assessment criteria [17],
consisting of:
1. Define study aims and use
2. Determine curriculum selection criteria
3. Delimitation of the number of documents to analyze
4. Filter relevant documentation and sources of data
5. Determine the curriculum features that will be the basis of comparison
6. Consolidate findings through visual representation</p>
      <p>In addition, we will perform a survey to gather insights from education professionals, institutions,
and centers regarding incorporating a human-centered approach in training cybersecurity experts. The
survey will be distributed electronically to a specifically targeted sample of individuals and
organizations within the European Union. This phase will encompass the following steps:
1. Definition of distribution channels, target audience, and distribution timeframe
2. Survey design: We will carefully design a questionnaire to capture relevant perspectives and
gather valuable information. Some questions could be:
a) How important do you consider including interdisciplinary perspectives (e.g., psychology,
sociology, law) in cybersecurity education?
b) How familiar are you with the concept of digital rights?
c) Are there any specific ethical or societal considerations that you believe should be addressed
in cybersecurity education?
3. Survey distribution
4. Results analysis and visualization
5. Recommendations for public policy</p>
      <p>Some of the limitations that may arise include: i) time constraints - the scope and available resources
may impose limitations on the depth and breadth of the analysis, potentially preventing a comprehensive
examination of all curricula and perspectives, and ii) sample bias - the survey responses and curricula
analyzed may not fully represent the entire population, and the findings may be influenced by the
characteristics and perspectives of the sampled individuals or organizations.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Prospects</title>
      <p>The findings of this study could inform the development of new cybersecurity curricula emphasizing
the ethical and social implications of cybersecurity and the significance of human rights protection in
digital contexts. Our study could also encourage additional research on this field, such as studies
examining the efficacy of different approaches to teaching and the effect of human-centered
perspectives on the attitudes and behaviors of cybersecurity experts. The results could also contribute
to implementing and promoting a comprehensive educational roadmap to promote human rights
knowledge among cybersecurity professionals.</p>
      <p>The analysis of human rights education as a component of European Union cybersecurity curricula
has the potential to influence policy, curriculum development, international collaboration, and future
research in the field. The findings could have far-reaching implications for cybersecurity education in
the European Union and beyond.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Acknowledgements</title>
      <p>This work was partially supported by project SERICS - "Security and Rights In the CyberSpace
SERICS" (PE00000014) under the MUR National Recovery and Resilience Plan funded by the
European Union - NextGenerationEU.
6. References
[17] J. Greatorex, N. Rushton, T. Coleman, E. Darlington, and G. Elliott, “Towards a Method for
Comparing Curricula,” University of Cambridge Local Examinations Syndicate (Cambridge
Assessment), Jul. 2019.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>I. O</surname>
          </string-name>
          'Sullivan, “Report: Cyberattacks Cost Most Businesses Over $
          <volume>100</volume>
          ,
          <fpage>000</fpage>
          ,” Tech.co,
          <source>Mar. 22</source>
          ,
          <year>2023</year>
          . https://tech.co/news/cyberattacks-cost
          <string-name>
            <surname>-</surname>
          </string-name>
          businesses-over-
          <volume>100000</volume>
          (accessed May 16,
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] ENISA, “
          <article-title>Cybersecurity Skills Development in the EU</article-title>
          ,
          <string-name>
            <surname>”</surname>
            <given-names>ENISA</given-names>
          </string-name>
          ,
          <year>2020</year>
          . https://www.enisa.europa.
          <article-title>eu/publications/the-status-of-cyber-security-education-in-the-europeanunion (accessed May 16,</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] Council of Europe, “
          <article-title>Introducing human rights education - Manual for Human Rights Education with Young people - www</article-title>
          .coe.int,”
          <article-title>Manual for Human Rights Education with Young people</article-title>
          ,
          <year>2023</year>
          . https://www.coe.int/en/web/compass/introducing
          <article-title>-human-rights-education (accessed May 16,</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Office of the United Nations High Commissioner</article-title>
          , “¿Qué son los derechos humanos?,” OHCHR. https://www.ohchr.org/es/what
          <article-title>-are-human-rights (accessed May 16,</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          , “
          <article-title>What about digital rights?</article-title>
          ,” Living Democracy, Nov.
          <volume>08</volume>
          ,
          <year>2022</year>
          . https://www.living
          <article-title>-democracy.com/what-about-digital-rights/ (accessed May 16,</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          , “
          <article-title>Privacy Knowledge Base for Supporting Decision-Making in Software Development</article-title>
          ,” in Sense, Feel, Design,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ardito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lanzilotti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Malizia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Larusdottir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Spano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Campos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hertzum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mentler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Abdelnour</given-names>
            <surname>Nocera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Piccolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sauer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Van Der Veer</surname>
          </string-name>
          , Eds., Cham: Springer International Publishing,
          <year>2022</year>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>157</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -98388-8_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cassano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pagano</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          , “
          <article-title>New perspectives for cyber security in software development: when End-User Development meets Artificial Intelligence</article-title>
          ,” in 2022 International Conference on Innovation and
          <article-title>Intelligence for Informatics, Computing, and Technologies (3ICT), Sakheer</article-title>
          , Bahrain: IEEE, Nov.
          <year>2022</year>
          , pp.
          <fpage>531</fpage>
          -
          <lpage>534</lpage>
          . doi:
          <volume>10</volume>
          .1109/3ICT56508.
          <year>2022</year>
          .
          <volume>9990622</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Catalano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chezzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelelli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Tommasi</surname>
          </string-name>
          , “
          <article-title>Deceiving AI-based malware detection through polymorphic attacks,” Comput</article-title>
          . Ind., vol.
          <volume>143</volume>
          , p.
          <fpage>103751</fpage>
          ,
          <string-name>
            <surname>Dec</surname>
          </string-name>
          .
          <year>2022</year>
          , doi: 10.1016/j.compind.
          <year>2022</year>
          .
          <volume>103751</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Raguseo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          , “
          <article-title>Teaching Cyber Security: The HACK-SPACE Integrated Model</article-title>
          ,” presented at the Italian Conference on Cybersecurity,
          <year>2019</year>
          . Accessed: May 18,
          <year>2023</year>
          . [Online]. Available: https://www.semanticscholar.org/paper/TeachingCyber-Security%
          <article-title>3A-The-HACK-SPACE-Integrated-BaldassarreBarletta/2cdd4024bd77d4bfdded094a3f0c8c2bcfda3cf3</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>European Union Agency for Cybersecurity., Cybersecurity education initiatives in the EU Member States: December 2022</article-title>
          . LU: Publications Office,
          <year>2023</year>
          . Accessed: May 16,
          <year>2023</year>
          . [Online]. Available: https://data.europa.eu/doi/10.2824/486119
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] ENISA,
          <string-name>
            <surname>“CYBERHEAD - Cybersecurity Higher</surname>
          </string-name>
          Education Database,” ENISA. https://www.enisa.europa.eu/topics/education/cyberhead (accessed May 16,
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>I. R</surname>
          </string-name>
          . Management Association, Ed.,
          <source>Cyber Security and Threats: Concepts</source>
          , Methodologies, Tools, and Applications.
          <source>IGI Global</source>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .4018/978-1-
          <fpage>5225</fpage>
          -5634-3.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Blažič</surname>
          </string-name>
          , “
          <article-title>The cybersecurity labour shortage in Europe: Moving to a new concept for education and training</article-title>
          ,
          <source>” Technol. Soc.</source>
          , vol.
          <volume>67</volume>
          , p.
          <fpage>101769</fpage>
          ,
          <string-name>
            <surname>Nov</surname>
          </string-name>
          .
          <year>2021</year>
          , doi: 10.1016/j.techsoc.
          <year>2021</year>
          .
          <volume>101769</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Taddeo</surname>
          </string-name>
          , “
          <article-title>Cyber Security and Individual Rights, Striking the Right Balance</article-title>
          ,” Philos. Technol., vol.
          <volume>26</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>353</fpage>
          -
          <lpage>356</lpage>
          , Dec.
          <year>2013</year>
          , doi: 10.1007/s13347-013-0140-9.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>U.</given-names>
            <surname>Pagallo</surname>
          </string-name>
          , “
          <article-title>Online Security and the Protection of Civil Rights: A Legal Overview</article-title>
          ,” Philos. Technol., vol.
          <volume>26</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>395</lpage>
          , Dec.
          <year>2013</year>
          , doi: 10.1007/s13347-013-0119-6.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pavlova</surname>
          </string-name>
          , “
          <article-title>Human Rights-based Approach to Cybersecurity: Addressing the Security Risks of Targeted Groups,” Peace Hum</article-title>
          . Rights Gov., vol.
          <volume>4</volume>
          , no.
          <issue>11</issue>
          /
          <year>2020</year>
          , pp.
          <fpage>391</fpage>
          -
          <lpage>418</lpage>
          ,
          <year>2020</year>
          , doi: 10.14658/pupj-phrg
          <source>-2020-3-4.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>