2020
DOI: 10.1016/j.cose.2020.101875
|View full text |Cite
|
Sign up to set email alerts
|

Cultivating cybersecurity learning: An integration of self-determination and flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
22
1

Year Published

2020
2020
2025
2025

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 51 publications
2
22
1
Order By: Relevance
“…To achieve the stated goals, a CentOS-based virtual private server is deployed and tested in Almaty, Kazakhstan, where the program consistency, quality ratio, user response time, solution efficiency, and threat avoidance capacity are monitored and calculated during testing process. The proposed WBCA is compared with the existing the state-of-the-art methods: Framework competence development and assessment(FCDA) [34], Integration of self-determination and flow (ISF) [35], modified total interpretive structural model (M-TISM) [36], Cybersecurity knowledge and skills(CKS) [37], and Cyber security awareness (CSA) [38].…”
Section: Methodsmentioning
confidence: 99%
“…To achieve the stated goals, a CentOS-based virtual private server is deployed and tested in Almaty, Kazakhstan, where the program consistency, quality ratio, user response time, solution efficiency, and threat avoidance capacity are monitored and calculated during testing process. The proposed WBCA is compared with the existing the state-of-the-art methods: Framework competence development and assessment(FCDA) [34], Integration of self-determination and flow (ISF) [35], modified total interpretive structural model (M-TISM) [36], Cybersecurity knowledge and skills(CKS) [37], and Cyber security awareness (CSA) [38].…”
Section: Methodsmentioning
confidence: 99%
“…To achieve the stated goals, a CentOS-based virtual private server is deployed and tested in Almaty, Kazakhstan, where the model consistency, quality ratio, user response time, solution efficiency and threat avoidance capacity are monitored and calculated during testing process. The proposed WBCA is compared with the existing the state-of-the-art methods: Framework competence development and assessment(FCDA) [31], Integration of self-determination and flow (ISF) [32], modified total interpretive structural model (M-TISM) [33], Cybersecurity knowledge and skills(CKS) [34], and Cyber security awareness (CSA) [35].…”
Section: Methodsmentioning
confidence: 99%
“…Based on SDT, studies have shown that promoting autonomy, competence, and relatedness can lead to enhanced intrinsic motivation [34,76]. Kam et al [34] proposed a research model by integrating flow theory with SDT.…”
Section: Perceived Autonomy and Interdependencementioning
confidence: 99%
“…Based on SDT, studies have shown that promoting autonomy, competence, and relatedness can lead to enhanced intrinsic motivation [34,76]. Kam et al [34] proposed a research model by integrating flow theory with SDT. They found significant effects of perceived autonomy, perceived competence, and perceived relatedness on motivation for cybersecurity learning.…”
Section: Perceived Autonomy and Interdependencementioning
confidence: 99%
See 1 more Smart Citation