Linked e-resources

Details

Intro
Preface
Organization
Contents
Attitudes and Perspectives
Cyber Security in Healthcare Organisations
1 Introduction
1.1 Research Aim
2 Literature Review
3 Research Method
3.1 Description of Goal Attainment Scaling (GAS)
3.2 Phase 1: Development of the GAS Evaluation Instrument
3.3 Phase 2: Use the GAS Evaluation Instrument
3.4 Phase 3: Analyse the Evaluation Results and Report to Management
4 Results
5 Limitations and Future Research
6 Conclusions
References
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?

1 Introduction
2 Research Approach
3 Results and Analysis
3.1 Fear of Doing Wrong
3.2 Fear of New Technology
3.3 Fear of Being Conned
3.4 Shame
4 Discussion and Conclusion
References
Exploring Experiences of Using SETA in Nordic Municipalities
1 Introduction
2 Research Approach
3 Results and Analysis
4 Discussion and Conclusion
References
Cyber Security Education
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education
1 Introduction
2 Literature Review
3 SherLOCKED: A Detective-Themed Serious Game for Security Education

3.1 Game Context
3.2 The Game
4 User Study and Discussion
4.1 Study Design
4.2 Results and Discussion
5 Conclusion and Future Work
References
A Reference Point for Designing a Cybersecurity Curriculum for Universities
1 Introduction
2 Research Aims
3 Background
4 Research Methodology
4.1 Research Method
4.2 Academic Publications Defining Cybersecurity Curricula
4.3 Results
4.4 Cybersecurity Curricula of Universities
4.5 Best Practice and Industry Frameworks for Cybersecurity Curricula
5 Reference Point for a Cybersecurity Curriculum

6 Conclusion
References
A Conceptual Information Security Culture Framework for Higher Learning Institutions
1 Introduction
2 Research Aim and Question
3 Background
3.1 Understanding Information Security Culture
3.2 Organisational Culture and Information Security Culture
4 Cultivating Information Security Culture in Universities
5 Scoping Literature Review
5.1 Results of Scoping Literature Review
5.2 Factors for Cultivating Information Security Culture
5.3 Literature Gaps Identified
6 A Conceptual Information Security Culture Framework
6.1 The STOPE View

6.2 The Relationship of STOPE Components
6.3 Schein's Concept of Organisational Culture
7 The InfoSeCulF
8 Limitations and Future Research
9 Conclusion
References
What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools
1 Introduction
2 Background
3 Data Collection and Analysis
3.1 Content of ISPs
3.2 Accessibility
3.3 Updating of ISPs
4 Discussion and Conclusions
References
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children
1 Introduction
2 Cybersecurity

Browse Subjects

Show more subjects...

Statistics

from
to
Export