2016
DOI: 10.1007/s11277-016-3380-z
|View full text |Cite
|
Sign up to set email alerts
|

Design of Security Training System for Individual Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…and preventing attacks, but their effectiveness still needs to be determined. Some conducted studies [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], suggest that such interventions can significantly reduce the risk of SE attacks being successful. Others report that they have a limited impact on user behavior [20], [21].…”
Section: User Awareness Training and Other Behavioral Interventions H...mentioning
confidence: 99%
See 2 more Smart Citations
“…and preventing attacks, but their effectiveness still needs to be determined. Some conducted studies [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], suggest that such interventions can significantly reduce the risk of SE attacks being successful. Others report that they have a limited impact on user behavior [20], [21].…”
Section: User Awareness Training and Other Behavioral Interventions H...mentioning
confidence: 99%
“…However, one article stated that awareness training is ineffective [20] or is not cost-effective [21]. Another stated that there are insufficient studies on security training for individual users [9], even though recognizing that user awareness is essential when reducing the risk of SE. Table 8 presents the employee's training impact according to the increase in cybersecurity and Information security within an enterprise or by not being adequate for cybersecurity and Information security improvement.…”
Section: Rq1: How Do Employee Training Programs Impact the Success Ra...mentioning
confidence: 99%
See 1 more Smart Citation
“…If each training scenario establishes a corresponding virtual machine, which will consume a lot of hard disk storage space of the physical host. [5] When students switch from web security training scenario A to web security training scenario B during hands-on training, they need to shut down the current virtual machine and start a new one, which will take up more CPU, memory, hard disk and other resources. As a result, the system response becomes slower and students have to wait for a long time.…”
Section: Introductionmentioning
confidence: 99%
“…There are several different ways to train users presented in the literature. These include providing lectures, text-based warnings, video instructions sent out via email at regular intervals, instructive games and training automatically provided to users in risky situations [21][22][23][24][25]. There are, however, several publications suggesting that many training efforts fail to support users towards secure behavior to a high enough degree [26,27].…”
Section: Introductionmentioning
confidence: 99%