Evaluation strategies for cybersecurity training methods: a literature review

J Kävrestad, M Nohlberg - Human Aspects of Information Security and …, 2021 - Springer
The human aspect of cybersecurity continues to present challenges to researchers and
practitioners worldwide. While measures are being taken to improve the situation, a vast …

[图书][B] Exploring the Relationships Between User Cybersecurity Knowledge, Cybersecurity and Cybercrime Attitudes, and Online Risky Behaviors

SA Roberts - 2021 - search.proquest.com
Organizations face an onslaught of threats to their mission-critical data. While organizations
continue to increase their investment in cybersecurity, user awareness, and Information …

Security technology and awareness training; do they affect behaviors and thus reduce breaches?

PE Williams-Banta - 2019 - search.proquest.com
There is increasing competitive pressure on organizations as they battle frequent, costly,
and complex cyber-attacks that seek to undermine the security, and availability of their …

Identifying HRM practices for improving information security performance: an importance-performance map analysis

P Kumah, W Yaokumah… - Research Anthology on …, 2022 - igi-global.com
This article focuses on identifying key human resource management (HRM) practices
necessary for improving information security performance from the perspective of IT …

[PDF][PDF] The misunderstood link: information security training strategy

HG Torres, S Gupta - 2018 - scholar.archive.org
Insecure user behavior and failure to identify phishing is a leading cause of information
security breaches triggering increased company costs in keeping information secure …

[图书][B] Exploring strategies for enforcing cybersecurity policies

BO Omoyiola - 2020 - search.proquest.com
Some cybersecurity leaders have not enforced cybersecurity policies in their organizations.
The lack of employee cybersecurity policy compliance is a significant threat in organizations …

Cybersecurity awareness training methods and user behavior

K McCarthy - 2021 - search.proquest.com
As organizations rely more on computers and information technology, the more at-risk they
are to security threats and incidents. Organizations spend significant resources on …

Information Security Awareness: Learning for Effectiveness

J Guimaraes - 2021 - search.proquest.com
This research argues that to increase information security awareness effectiveness in
preventing data incidents, a learning mindset must be in place at the individual and …

Haxe as a Swiss knife for bioinformatic applications: the SeqPHASE case story

Y Spöri, JF Flot - Briefings in bioinformatics, 2024 - academic.oup.com
Haxe is a general purpose, object-oriented programming language supporting syntactic
macros. The Haxe compiler is well known for its ability to translate the source code of Haxe …

Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

S Altamimi - 2022 - theses.gla.ac.uk
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs),
which have become highly crucial IT assets that require significant security efforts to …