책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 기업 애플리케이션 > 일반
· ISBN : 9783031385322
· 쪽수 : 484쪽
· 출판일 : 2024-07-27
목차
Education & Training.-?Combating digital exclusion with cybersecurity training - an interview study with Swedish seniors.-?Another look at cybersecurity awareness programs.-?Cyber range exercises: potentials and open challenges for organisations.-?An adaptive plug-and-play (PnP) interactive platform for an e-voting based cybersecurity curricula.-?Cybersecurity training acceptance: a literature review.-?Cyber security awareness and education support for home and hybrid workers.-?On-campus hands-on ethical hacking course: design, deployment and lessons learned.-?Planning for professional development in cybersecurity: a new curriculum design.-?A comprehensive design framework for multi-disciplinary cyber security education.-?Key elements for cybersafety education of primary school learners in South Africa.-?Factors associated with cybersecurity culture: a. quantitative study of public e-health hospitals in South Africa.-?Towards a framework for the personalization of cybersecurity awareness.-?Management, Policy & Skills.- A?qualitative content analysis of actionable advice in Swedish public agencies' information security policies.-?Business language for information security.-?Check, check, check, we got those" - Catalogue use in information security risk management.-?Proposed guidelines for website data privacy policies and an application thereof.-?Towards roles and responsibilities in cyber security awareness framework for South African Small, Medium and Micro Enterprises (SMMEs).- Is?your CISO burnt out yet? Examining demographic differences in workplace burnout amongst cyber security professionals.-?An investigation into the cybersecurity skills gap in South Africa.-?Cybersecurity-related behavior of personnel in the Norwegian industry.-?Evolving Threats & Attacks.- Its's?more than just money: the real-world harms from ransomware attacks.-?Cyberthreats in modern cars: responsibility and readiness of auto workshops.-?Decreasing physical access bottlenecks through context-driven authentication.-?Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective.-?Are people with cyber security training worse at checking phishing email addresses? Testing the automaticity of verifying the sender's address.-?Content analysis of persuasion princples in mobile instant message phishing.-?Six-year study of emails sent to unverified addresses.-?Social-Technical Factors.-?Evaluating the risks of human factors associated with social media cybersecurity threats.-?Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia.-?To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks.-?Analyzing cyber security definitions for non-experts.-?On using the task models for validation and evolution of usable security design patterns.-?Chatbots: a framework for improving information security behaviors using ChatGPT.-?Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers.-?The influence of interpersonal factors on telecommuting employees' cybercrime preventative behaviors during the pandemic.-?Research Methods.-?A review of constructive alignment in information security educational research.-?What goes around comes around; effects of unclear questionnaire items in information security research.















