[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

A systematic review of multimedia tools for cybersecurity awareness and education

L Zhang-Kennedy, S Chiasson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
We conduct a comprehensive review covering academic publications and industry products
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …

Theory-driven game-based assessment of general cognitive ability: Design theory, measurement, prediction of performance, and test fairness.

RN Landers, MB Armstrong, AB Collmus… - Journal of Applied …, 2022 - psycnet.apa.org
Games, which can be defined as an externally structured, goal-directed type of play, are
increasingly being used in high-stakes testing contexts to measure targeted constructs for …

Game based cyber security training: are serious games suitable for cyber security training?

M Hendrix, A Al-Sherbaz… - International Journal of …, 2016 - pure.northampton.ac.uk
Security research and training is attracting a lot of investment and interest from governments
and the private sector. Most efforts have focused on physical security, while cyber security or …

[HTML][HTML] Modeling effective cybersecurity training frameworks: A delphi method-based study

N Chowdhury, S Katsikas, V Gkioulos - Computers & Security, 2022 - Elsevier
Today, cybersecurity training is commonplace in both large companies and Small & Medium
Enterprise (SME). Nonetheless, the effectiveness of many of the current training offerings is …

[HTML][HTML] Cybersecurity Enhancement through Blockchain Training (CEBT)–A serious game approach

A Mittal, MP Gupta, M Chaturvedi… - International Journal of …, 2021 - Elsevier
Blockchain technology is increasingly finding traction in diverse areas such as finance,
supply-chain management, and cloud services because of its ability to provide robust …

Cybersecurity skills training: An attacker-centric gamified approach

M Adams, M Makramalla - Technology Innovation Management …, 2015 - timreview.ca
Although cybersecurity awareness training for employees is important, it does not provide
the necessary skills training required to better protect businesses against cyber-attacks …

Exploring cybersecurity education and training techniques: a comprehensive review of traditional, virtual reality, and augmented reality approaches

AM Alnajim, S Habib, M Islam, HS AlRawashdeh… - Symmetry, 2023 - mdpi.com
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …

Applying basic gamification techniques to IT compliance training: Evidence from the lab and field

RJ Baxter, DK Holderness Jr… - Journal of information …, 2016 - publications.aaahq.org
Companies depend on internal control to protect the integrity of information systems. IT
security and data privacy training are critical controls for safeguarding company information …

[HTML][HTML] The deceitful connected and autonomous vehicle: defining the concept, contextualising its dimensions and proposing mitigation policies

A Nikitas, S Parkinson, M Vallati - Transport policy, 2022 - Elsevier
Abstract The Connected and Autonomous Vehicle (CAV) is an emerging mobility technology
that may hold a paradigm-changing potential for the future of transport policy and planning …