<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Joint Proceedings of IS-EUD</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>for Industry and Academia (CSE4IA 2025)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vita Santa Barletta</string-name>
          <email>vita.barletta@uniba.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Federica Caruso</string-name>
          <email>federica.caruso1@univaq.it</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francesco Greco</string-name>
          <email>francesco.greco@uniba.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Manuel Angel Serrano</string-name>
          <email>manuel.serrano@uclm.es</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hannan Xiao</string-name>
          <email>hannan.xiao@kcl.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chaminda Alocious</string-name>
          <email>chamindaucsc@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>King's College London</institution>
          ,
          <addr-line>Strand Campus, Bush House, 30 Aldwych, London, WC2B 4BG</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bari</institution>
          ,
          <addr-line>Via Orabona 4, 70125 Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Castilla-La Mancha, Paseo de la Universidad 4</institution>
          ,
          <addr-line>13071, Ciudad Real</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Hertfordshire, College Ln</institution>
          ,
          <addr-line>Hatfield AL10 9AB</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>University of L'Aquila</institution>
          ,
          <addr-line>Via Vetoio 1, 67100 L'Aquila</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>10</volume>
      <fpage>16</fpage>
      <lpage>18</lpage>
      <abstract>
        <p>Cybersecurity education faces significant challenges due to evolving digital threats and a shortage of skilled professionals. Bridging industry, academia, and public administration is crucial for developing innovative training methods and tools that equip students, professionals, and non-experts with the skills needed to efectively address cybersecurity risks. Based on previous editions' success, CSE4IA 2025 will explore how end-user development (EUD), AI-driven learning, and low-code/no-code approaches can enhance cybersecurity education. The workshop will bring together researchers and practitioners to discuss user-centered learning environments that help endusers understand and mitigate security risks. By fostering interdisciplinary collaboration, CSE4IA 2025 seeks to redefine cybersecurity education with innovative, user-friendly solutions that strengthen security awareness and resilience. By ofering a dynamic, multidisciplinary platform, the workshop will showcase cutting-edge educational tools and methodologies, empowering both professionals and everyday users to navigate cybersecurity risks in an increasingly digital world confidently.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The rapid integration of digital technologies has led to a significant rise in cyber threats, from personal
data breaches to large-scale attacks on critical infrastructure. These threats, often driven by criminal
intent for financial gain or disruption, continue to grow in both frequency and sophistication. While
technological countermeasures lay the foundations for cybersecurity, the human element still has
a major impact for the success of most cyberattacks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Therefore, organizations should prioritize
cybersecurity education, which must go beyond training skilled professionals and must rather address
the broader challenge of public awareness.
      </p>
      <p>At the same time, the global job market faces an urgent supply and demand gap in cybersecurity
recruitment. The increase in cyber-attacks has intensified the need for qualified professionals, yet
traditional education and training programs struggle to keep pace with evolving industry demands.
Organizations such as ENISA (European Union Agency for Cybersecurity) emphasize the need for
a standardized understanding of cybersecurity roles, competencies, and career pathways. However,
more efort is needed to bridge the gap between academic training and real-world business needs,
ensuring that professionals and end-users alike develop the necessary skills to mitigate cybersecurity
risks efectively.</p>
      <p>CEUR</p>
      <p>ceur-ws.org</p>
      <p>
        To tackle these challenges, cybersecurity education must embrace innovative approaches that combine
technological advancements with practical, hands-on learning [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Interactive methods such as
Artificial Intelligence-powered training tools, gamified learning experiences, and immersive simulations
can enhance skill development by providing realistic cybersecurity scenarios. These approaches not only
strengthen professional training but also make complex security concepts more intuitive for non-expert
users. Furthermore, as digital transformation accelerates, ensuring that both public and private sector
employees are equipped to securely manage sensitive data is crucial. A modern cybersecurity education
framework should therefore integrate these advancements to create more efective, accessible, and
engaging learning environments.
      </p>
      <p>
        The 3rd International Workshop on Cyber Security Education for Industry and Academia (CSE4IA
2025) continues the mission of its previous editions [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] by ofering a collaborative platform for
researchers and practitioners to discuss innovative educational strategies. Co-located with IS-EUD 2025,
the workshop will explore how End-User Development (EUD), Human-Computer Interaction (HCI)
principles, and emerging technologies, such as Artificial Intelligence (AI) and Virtual Reality (VR), can
create more engaging and efective cybersecurity learning environments. Special attention will be given
to practical approaches that close the gap between cybersecurity education and real-world applications,
equipping professionals and end-users with the necessary skills to navigate today’s complex digital
landscape.
      </p>
      <p>
        As in previous editions [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], CSE4IA 2025 aims to redefine cybersecurity education by fostering
interdisciplinary collaboration and promoting user-centered training solutions. The workshop will provide
a dynamic, multidisciplinary platform for sharing cutting-edge tools and methodologies, empowering
both professionals and everyday users to confidently manage cybersecurity risks in an increasingly
digital world. We invite researchers, educators, and industry experts to contribute with innovative
research, case studies, and best practices that shape the future of cybersecurity education, ensuring a
more secure and resilient digital ecosystem for all.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Topics of Interest</title>
      <p>The topics of interest for the 3rd International Workshop on CyberSecurity Education for Industry and
Academia (CSE4IA 2025) include, but are not limited to:
• Conversational Interface in Cybersecurity Education
• Approaches, methods, and techniques for enabling users to create, modify, and customize digital
tools and systems while considering cybersecurity issues.
• Case studies and design implications on Cybersecurity issues and practices of end-user
development</p>
    </sec>
    <sec id="sec-3">
      <title>3. Workshop Format</title>
      <p>The workshop will take place over a single full day. It will begin with an opening session, during which
the organizers will welcome participants and outline the schedule.</p>
      <p>This will be followed by a keynote designed to inspire and set the stage for the workshop’s discussions.
Then the presentation sessions will start and its schedule will vary based on the type of paper: (i)
Regular papers (up to 10 pages, excluding references) will have 10 minutes for presentation and 5
minutes for discussion, while (ii) Extended Abstracts (up to 4 pages, excluding references) will have 7
minutes for presentation and 5 minutes for discussion. The number of presentation sessions will be
tailored to the number and type of accepted submissions. After the presentation sessions, the workshop
will culminate in a roundtable discussion featuring representatives from both academia and industry.
This interactive session will explore the future of cybersecurity education, emphasizing innovative
technologies, interdisciplinary collaboration, and industry-academia partnerships to address the skills
gap. It aims to identify key challenges, opportunities, and actionable strategies, generating ideas to
shape future research, policy, and educational practices, ensuring a forward-looking conclusion of
CSE4IA 2025.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Workshop Participants</title>
      <p>The target audience for CSE4IA is diverse, reflecting the multidisciplinary nature of cybersecurity
education. It includes researchers in fields like computer science, technology-enhanced learning,
education, and HCI, cybersecurity professionals from industry, policymakers, tech industry representatives
interested in educational trends, and students in computer science and related fields seeking to enhance
their skills. This diverse group will foster rich discussions and contribute to the advancement of
cybersecurity education. We expect 15 to 35 attendees, invited through direct outreach to academics,
industry professionals, and policymakers, and promoted via mailing lists, professional networks, social
media, and a dedicated website (https://sites.google.com/view/cse4ia-2025).</p>
    </sec>
    <sec id="sec-5">
      <title>5. Planned Outcomes of the Workshop</title>
      <p>All submissions will undergo a rigorous double-blind peer-review process, focusing on originality,
quality, soundness, and relevance, with each paper reviewed by three program committee members.
Accepted submissions will be published in the CSE4IA 2025 workshop proceedings (CEUR-WS). As
in the previous editions, authors of selected high-quality papers will be invited to submit extended
versions for potential publication in a special issue of a leading international journal.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Workshop Organizing Committee</title>
      <p>Vita Santa Barletta is an Assistant Professor at the Department of Computer Science at the University of
Bari “Aldo Moro”. Her research interests include cybersecurity, cyber social security, quantum software
engineering, and secure software engineering. In the past, she organized the following workshops: the
1st and 2nd edition of CSE4IA; the 1st and 2nd edition of QP4SE (Quantum Programming for Software
Engineering); the 2nd edition of CISE’23 (Computational Intelligence and Software Engineering).</p>
      <p>Federica Caruso is a post-doc research fellow at the Department of Information Engineering,
Computer Science and Mathematics (DISIM) of the University of L’Aquila (Italy). Her primary research
interests are in Assistive Technology and Technology-Enhanced Learning. In particular, she is working
on methodologies for designing Serious Games and Immersive Virtual Reality-based learning-oriented
systems. In the past, she organized the 1st and 2nd edition of CSE4IA.</p>
      <p>Francesco Greco is a Research fellow and third-year PhD student at the University of Bari “Aldo
Moro”, where he conducts research on the fields of Usable Security and Human-Centered Explainable AI
with the Interaction, Visualization, Usability &amp; UX (IVU) laboratory. During his PhD, he has also been a
visiting student at King’s College London in the Cybersecurity (CYS) group, under the supervision of
Prof. Luca Viganò. He will serve as both the Publicity Chair and the Website Chair for CSE4IA 2025. In
this role, he will handle workshop promotion and communication, as well as the creation and upkeep
of the website.</p>
      <p>Manuel A. Serrano is an Assistant Professor at the Escuela Superior de Informática, University of
Castilla-La Mancha, Ciudad Real. Regarding his research interests, he is working on cyber security
(especially in Big Data and the IoT), quantum software engineering, software quality, and measurement
and business intelligence. His scientific production is large, having published more than 50 papers in
high-level journals and conferences. He has participated in more than 20 research projects, has conducted
several invited speeches, and has worked in several transfer projects with companies. In the past, he
organized the following workshops: the 1st and 2nd edition of QP4SE (Quantum Programming for
Software Engineering); the 1st edition of E-QSE (Empirical Studies for Quantum Software Engineering).</p>
      <p>Hannan Xiao is a Senior Lecturer in Computer Science Education in the Department of Informatics,
King’s College London. She is a Senior Fellow of the Higher Education Academy (SFHEA). She obtained
her PhD from the National University of Singapore, and completed her MEng and BEng from the
Huazhong University of Science and Technology, China. Before joining King’s College London, Hannan
held positions as Principal Lecturer at the University of Hertfordshire, UK, Research Fellow at the
National University of Singapore, and Assistant Professor at the Huazhong University of Science and
Technology, China.</p>
      <p>Chaminda Alocious is a former Network Security Researcher at the University of Herefordshire,
UK, specializing in wireless network security. He obtained his Ph.D. in Network Security from the
University of University, UK. Chaminda Alocious is a Senior Software Engineer for Deutsche Bank, UK
with over decade of experience in the Software industry, and has specialized in building secure software
systems for accessing confidential data and improving secure software design.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Workshop Program Committee</title>
      <p>The program committee members will be selected from both senior and junior researchers working
on the topics of CSE4IA 2025. This ensures a high-quality review process while also fostering the
integration of junior researchers into the community.</p>
      <p>Below is the list of CSE4IA 2025 program committee members:
• Mario Angelelli – University of Salento (Italy)
• Danilo Caivano – University of Bari (Italy)
• Dajana Cassioli – University of L’Aquila (Italy)
• Alessia Catalano - University of Salento (Italy)
• Mirko De Vincentiis - SER&amp;P, University of Bari spin-of (Italy)
• Flaminia Del Conte – Hackable S.r.l. (Italy)
• Samuele Del Vescovo - IMT School Lucca (Italy)
• Giuseppe Desolda – University of Bari (Italy)
• Alessio Di Santo - University of L’Aquila (Italy)
• Leonardo Fazzini - University of L’Aquila (Italy)
• Ilenia Fronza – Free University of Bozen-Bolzano (Italy)
• Tasmina Islam – King’s College London (UK)
• Annita Larissa Sciacovelli – ENISA
• Antonio Piccinno – University of Bari (Italy)
• Valerio Rughetti – LUISS ”Guido Carli” (Italy)
• Walter Tiberti – University of L’Aquila (Italy)
• Luca Viganò – King’s College London (UK)</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>This workshop is supported by SERICS (Security and Rights in CyberSpace) - CSS - Cyber Social Security,
Spoke 3: Attacchi e Difesa(PE00000014) under the MUR National Recovery and Resilience Plan funded
by the European Union - NextGenerationEU.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Verizon</surname>
          </string-name>
          ,
          <source>2024 data breach investigations report</source>
          ,
          <year>2024</year>
          . URL: https://www.verizon.com/business/ resources/reports/dbir/#DBIR2024NR, http://www.xbow.com.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Curci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>Serious games for cybersecurity: How to improve perception and human factors</article-title>
          ,
          <source>in: 2023 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering</source>
          , MetroXRAINE 2023 - Proceedings,
          <year>2023</year>
          , p.
          <fpage>1110</fpage>
          -
          <lpage>1115</lpage>
          . doi:
          <volume>10</volume>
          .1109/MetroXRAINE58569.
          <year>2023</year>
          .
          <volume>10405607</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Curci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rossano</surname>
          </string-name>
          ,
          <article-title>A rapid review on serious games for cybersecurity education: Are “serious” and gaming aspects well balanced?</article-title>
          ,
          <source>in: CEUR Workshop Proceedings - Joint Proceedings of the Workshops</source>
          ,
          <article-title>Work in Progress Demos and Doctoral Consortium at the IS-EUD 2023 co-located with the 9th International Symposium on End-User Development (IS-EUD</article-title>
          <year>2023</year>
          ), volume
          <volume>3408</volume>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Peretti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rossano</surname>
          </string-name>
          ,
          <article-title>Cybersecurity education for industry and academia - cse4ia, in: Joint Proceedings of the Workshops, Work in Progress Demos and Doctoral Consortium at the IS-EUD 2023</article-title>
          , volume
          <volume>3408</volume>
          <source>of WWDD@IS-EUD</source>
          <year>2023</year>
          ,
          <article-title>CEUR-</article-title>
          <string-name>
            <surname>WS</surname>
          </string-name>
          ,
          <year>2023</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3408</volume>
          /short-s3-
          <fpage>00</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Mascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rossano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <article-title>Cybersecurity education for industry and academia</article-title>
          (cse4ia
          <year>2024</year>
          ),
          <source>in: Proceedings of the 2024 International Conference on Advanced Visual Interfaces</source>
          ,
          <source>AVI '24</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2024</year>
          . URL: https://doi.org/10.1145/3656650.3660536. doi:
          <volume>10</volume>
          .1145/3656650.3660536.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>