DIS4SME: Fostering Skills in Location Data Interoperability for the Digital Transformation of SMEs
Best practices Fostering Skills in Location Data Interoperability for the Digital Transformation of SMEs Users: Training providers (public) | Training providers (private) | SMEs | Theme: Programme development | Action: Education programmes/courses | Beneficiaries: SMEs | Labour force (employed) DIS4SMEdis4sme.eu Mayte Toscano The Level “Digital transformation and data interoperability are fundamental pillars of the European Union’s strategy for global competitiveness. The European Data Strategy and the European Digital Strategy seek to create a single market for data, promoting digital sovereignty, accessibility to open data and cross-border cooperation in key sectors such as mobility, agriculture and urban planning.At a legislative level, the EU has adopted several key regulations to ensure secure and equitable access to data: Data Governance Act (DGA): mechanisms to improve the availability of data and regulates the reuse of sensitive public data. Data Act (Data Act): equitable access and use of data generated in the EU, promoting interoperability and innovation. INSPIRE Directive: legal framework for interoperability and accessibility of geospatial data. European Common Data Spaces: data exchange platforms in key sectors. In this framework, location data plays a fundamental role in urban planning, mobility, agriculture and other key sectors. However, SMEs still find it difficult to benefit from these initiatives due to a lack of training and adequate resources. The challenge? Despite the solid regulatory framework and the opportunities offered by the data economy, many European SMEs face significant barriers to the adoption of interoperable solutions: Lack of knowledge and technical skills Lack of awareness of European open data and location standards (INSPIRE, OGC, ISO) or how to apply them Disconnect between regulations and business adoption Lack of alignment between national and European regulations Fragmentation in data governance Complex administrative procedures Resource, money and time constraints According to reports from the OECD and the European Commission, the digital divide between large companies and SMEs is growing, with many small businesses lagging behind in terms of access to and use of digital technologies. Our solution DIS4SME has developed a comprehensive approach based on: Programmes of specific training in location data interoperability, with different modules for managers and technicians. These courses, aimed at managers, technicians and job seekers, cover topics such as: Mobile food market Digital agriculture Social monitoring of road conditions 3D, BIM, Digital Twins for urban planning Learning strategies adapted, with short courses, interactive seminars and digital platforms that allow flexible access to the content. Collaboration with digital innovation hubs to promote synergies between companies, institutions and regulatory bodies. Sector-specific business cases, addressing interoperability in strategic sectors such as precision agriculture, smart mobility and urban planning. Outcomes Development of a curriculum based on 30 Horizontal Learning Outcomes: This structured set of training objectives has made it possible to adapt the content to the specific needs of both managers and technicians in SMEs, guaranteeing the coherence and scalability of the programme. The use of e-learning modules, video tutorials, webinars and practical workshops has provided flexible and accessible training, adapted to the different profiles and availability of SMEs. The initiative has fostered the creation of synergies between SMEs, digital innovation hubs and public bodies, promoting the exchange of knowledge and the adoption of best practices. The bottom-up methodology, based on gathering feedback from participants, has allowed the training content to be refined and optimised, ensuring that the educational offering adjusts to the real demands of the business environment. SMEs have been strengthened to face the challenges of digital transformation, facilitating their integration into the European market and the adoption of solutions based on open data. Key takeaways Adaptability of the training approach: The model of short, modular courses with flexible access allows managers, technicians and job seekers to acquire knowledge without interrupting their daily responsibilities. Public-private collaboration: The participation of digital innovation hubs, regulatory bodies and SMEs has been key to ensuring that the courses respond to the real needs of the sector. Use of open standards: Incorporating standards such as INSPIRE, OGC and ISO facilitates data interoperability and ensures that SMEs can integrate into the digital economy without relying on proprietary solutions. Focus on strategic sectors: Designing courses around real business cases (digital agriculture, mobility, urban planning) makes learning applicable and replicable in different industries. Scalability and replicability: The model can be expanded to other sectors and European countries, adapting to different levels of knowledge and the specific needs of SMEs. Learn more here
Enhancing Cybersecurity Training: Effective Learning Strategies, Clear Communication, and Demand-Driven Programs
Best practices Effective Learning Strategies, Clear Communication, and Demand-Driven Programs in Cybersecurity Users: Training providers (public) | Training providers (private) | SMEs | Theme: Reskilling and upskilling | Action: Professional training | Beneficiaries: Industry | SMEs | Labour force (employed) | Labour force (unemployed) CYRUSCYRUS Project Enrico Frumento, CEFRIELAlessia Golfetti, Deep Blue In the constantly evolving realm of cybersecurity, the human aspect is crucial yet frequently underestimated. Cybersecurity involves protecting IT systems from threats posed by cybercriminals. These criminals might aim to manipulate systems, steal or export data, or disrupt or alter services. However, what occurs when individuals, rather than IT systems, become the focus of these attacks? Moving from targeting systems to targeting people necessitates a different methodology and a shift in tactics. The CYRUS European project developed personalised cybersecurity training programmes specifically for the manufacturing and transport sectors. The project identified key findings regarding the distinct skill shortfalls and training necessities within these industries. These sectors’ peculiar challenges are not merely technical. There is a strong request of personalised training to enable employees at every level, from the factory floor to the executive suite, to recognise and counter cybersecurity threats effectively. The other need is the decoding of complexity of cybersecurity, which often is more focused on basic skills and personal cyber hygiene. The challenge? Today, we witness an increasing demand for advanced skills and a chronic lack of dedicated time from learners. Due to these challenges, cybersecurity experts and instructors have explored alternative teaching methodologies in cybersecurity training. Cybersecurity is one of the most challenging areas due to the rapidly changing Tactics, Techniques, and Procedures (TTPs) used in cybercrime. Defensive technologies are keeping up with the same speed of change. This challenge is where CYRUS comes in – experimenting with pedagogical methodologies to enhance and make cybersecurity training more efficient. On one hand EU is heavily investing in creating training opportunities, but with a quite often sub-optimal approach. The result is a crowded panorama of training offerings, sometimes overlapping and of hetereogeneous quality. One of the challenges of CYRUS was to create a training catalogue which is clear, multilingual, prepared with modern pedagogical approach and ground based on which are the real pains of the working forces and companies. Our solution Select the proper learning paradigm among pedagogy, andragogy and heutagogy, especially cybersecurity learning: Instructional methodologies are categorised into four macro areas: Non-Interactive Learning, Interactive Learning, Shared Learning, and Evaluation and Monitoring, each tailored to address the unique needs of adult learners. Non-interactive learning methodologies, rooted in traditional pedagogy, emphasise direct instruction and structured content delivery. Interactive Learning methodologies, informed by andragogical principles, prioritise active engagement and collaboration among learners. Shared Learning methodologies, inspired by heutagogical principles, underscore the importance of community, collaboration, and knowledge-sharing. Evaluation and Monitoring methodologies are crucial in assessing learning outcomes and guiding ongoing improvement efforts. Do massive use of instructional design: The instructional design approach for the CYRUS Project reflects a dynamic and adaptive framework rooted in the principles of pedagogy, Andragogy, and heutagogy. Clarity of language: use the ISO 24495-1:2023 on plain language Ad-hoc training: Root your training catalogue on ground truth, which means the actual pains and lack of companies and people. For example, in the CYRUS project, one of the most requested courses was on personal and corporate cyber hygiene, which reflects the fear of most people of wrongdoing and perils in the cyber realm. We started to affect behavioural shifts in cybersecurity from there. Outcomes CYRUS free Courses catalogue: The CYRUS project is ongoing, and the course catalogue will be delivered in April. Chunk courses, choose the best learning paradigm, and keep content simple (i.e., the KISS approach) but effective: The pilot programs, performed between October 2024 and February 2025, helped us identify some interesting challenges and refine the training content. One of the most significant findings is the necessity to present the material in small, interactive chunks (e.g., chunking was preferred over nudging). This approach aligns with current trends in online training in other educational sectors, but less on cybersecurity, where long and complex courses are still the norm. Basic skills are the most requested: There is a greater demand for basic skills that are immediately applicable to everyday work. For instance, the most requested course was on personal and corporate cyber hygiene to protect themselves, their families and loved ones, and the corporation. Key takeaways Explore and Apply New Learning Paradigms: Effective cybersecurity training requires selecting the right approach or combination of approaches—pedagogy, andragogy, or heutagogy—based on the audience. Given that many learners are professionals balancing work and training, programs must be flexible, engaging, and tailored. Additionally, training programs for trainers are essential to ensure effective knowledge transfer. Cybersecurity Training must go beyond technical skills, behavioural shifts are key: Cybersecurity training is a risk reduction method that enhances an organization’s overall security posture. Training should foster a cultural shift where security is seen as a way to improve both personal and professional well-being. Instead of reinforcing a “”toxic culture of error,”” training should make online security natural and stress-free. The Role of Instructional Design: A strong instructional design framework, like the one used in CYRUS, helps create structured, impactful, and adaptive cybersecurity training programs. Clarity in Communication: Using ISO 24495-1:2023 plain language principles ensures that complex cybersecurity concepts are easily understandable, making training more accessible. Demand-Driven Training for Relevance: Cybersecurity training should be rooted in real-world concerns. In the CYRUS project, cyber hygiene training was in high demand, highlighting the importance of addressing learners’ fears and practical needs. This approach increases adoption and drives meaningful behavioral change. Learn more here
Codesign for Cutting-Edge Digital Skills – The ACHIEVE Model
The ACHIEVE project serves as a best practice example of how collaborative codesign between academia and industry can revolutionize digital education.