Linked e-resources

Details

Education & Training
Combating digital exclusion with cybersecurity training : an interview study with Swedish seniors
Another look at cybersecurity awareness programs
Cyber range exercises: potentials and open challenges for organisations
An adaptive plug-and-play (PnP) interactive platform for an e-voting based cybersecurity curricula
Cybersecurity training acceptance: a literature review
Cyber security awareness and education support for home and hybrid workers
On-campus hands-on ethical hacking course: design, deployment and lessons learned
Planning for professional development in cybersecurity: a new curriculum design
A comprehensive design framework for multi-disciplinary cyber security education
Key elements for cybersafety education of primary school learners in South Africa
Factors associated with cybersecurity culture: a. quantitative study of public e-health hospitals in South Africa
Towards a framework for the personalization of cybersecurity awareness
Management, Policy & Skills
A qualitative content analysis of actionable advice in Swedish public agencies' information security policies
Business language for information security
Check, check, check, we got those" : Catalogue use in information security risk management
Proposed guidelines for website data privacy policies and an application thereof
Towards roles and responsibilities in cyber security awareness framework for South African Small, Medium and Micro Enterprises (SMMEs)
Is your CISO burnt out yet? Examining demographic differences in workplace burnout amongst cyber security professionals
An investigation into the cybersecurity skills gap in South Africa
Cybersecurity-related behavior of personnel in the Norwegian industry
Evolving Threats & Attacks
Its's more than just money: the real-world harms from ransomware attacks
Cyberthreats in modern cars: responsibility and readiness of auto workshops
Decreasing physical access bottlenecks through context-driven authentication
Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective
Are people with cyber security training worse at checking phishing email addresses? Testing the automaticity of verifying the sender's address
Content analysis of persuasion princples in mobile instant message phishing
Six-year study of emails sent to unverified addresses
Social-Technical Factors
Evaluating the risks of human factors associated with social media cybersecurity threats
Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia
To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks
Analyzing cyber security definitions for non-experts
On using the task models for validation and evolution of usable security design patterns
Chatbots: a framework for improving information security behaviors using ChatGPT
Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers
The influence of interpersonal factors on telecommuting employees’ cybercrime preventative behaviors during the pandemic
Research Methods
A review of constructive alignment in information security educational research
What goes around comes around; effects of unclear questionnaire items in information security research.

Browse Subjects

Show more subjects...

Statistics

from
to
Export