Research Anthology on Advancements in Cybersecurity Education 2022
DOI: 10.4018/978-1-6684-3554-0.ch013
|View full text |Cite
|
Sign up to set email alerts
|

A Holistic View of Cybersecurity Education Requirements

Abstract: This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Protecting shared information from these threats requires implementing cybersecurity measures in line with Information Security Management guidelines. (Furnell & Vasileiou, 2022). Distance education, initiated in the 1970s, has witnessed significant growth with the advent of the Internet.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Protecting shared information from these threats requires implementing cybersecurity measures in line with Information Security Management guidelines. (Furnell & Vasileiou, 2022). Distance education, initiated in the 1970s, has witnessed significant growth with the advent of the Internet.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furnell & Vasileiou also emphasize that CS is often seen as someone else's problem, with the result that the very parties who should be involved in it instead distance themselves from it. For example, end users often seem to assume that their employer, ISP, or some other party takes care of their security needs [40]. In reality, they themselves as individuals play an important role because no matter what steps are taken elsewhere, there will be some threats that reach them directly [40].…”
Section: Topic "Home Office"mentioning
confidence: 99%
“…For example, end users often seem to assume that their employer, ISP, or some other party takes care of their security needs [40]. In reality, they themselves as individuals play an important role because no matter what steps are taken elsewhere, there will be some threats that reach them directly [40]. So, individuals will find that they need to make security-related decisions, and they clearly need some level of awareness and understanding to do so [40].…”
Section: Topic "Home Office"mentioning
confidence: 99%
See 1 more Smart Citation
“…Many college students are aware of smartphone security issues, but they are also unaware of all security threats and proper security safeguards [ 38 ]. Some of the latest works on cybersecurity awareness are [ 39 – 42 ].…”
Section: Introductionmentioning
confidence: 99%