IEEE EDUCON 2010 Conference 2010
DOI: 10.1109/educon.2010.5492435
|View full text |Cite
|
Sign up to set email alerts
|

State-of-the-art simulation systems for information security education, training and awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(33 citation statements)
references
References 8 publications
0
33
0
Order By: Relevance
“…Human behavior that mainly lead to performance is recognized as a major problem in the implementation of information security practices in institution [1][3] [7]. However, others claims that organization has no need to influence a user's behavior towards compliance with IS security instructions if the instructions are not available in an accepted format where regular assessment, evaluation of the effectiveness of the IS security awareness approaches and readjustment are much more necessary [8] [9]. As such, researchers have called for the creation of ISC to help organizations to influence employee performance in order to better protect organizational information [15].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Human behavior that mainly lead to performance is recognized as a major problem in the implementation of information security practices in institution [1][3] [7]. However, others claims that organization has no need to influence a user's behavior towards compliance with IS security instructions if the instructions are not available in an accepted format where regular assessment, evaluation of the effectiveness of the IS security awareness approaches and readjustment are much more necessary [8] [9]. As such, researchers have called for the creation of ISC to help organizations to influence employee performance in order to better protect organizational information [15].…”
Section: Discussionmentioning
confidence: 99%
“…Marks and Rezqui [8] suggested training and campaign as the best methods to increase understanding about ISA accommodates the uniqueness of specific location and durable of time. It is also important that the message and materials of IS training are the same regardless of who the trainer is [9] as well as regularly and continuity to increase the awareness in security performance.…”
Section: Discussionmentioning
confidence: 99%
“…Similarly, Hazeyama et al, proposed a learning environment for software security education [10]. Others have sought to develop lab environments [7], simulations [17], analysis frameworks [ 18], [19], and reconfigurable course modules [2], [27] to facilitate technical learning of specific and hands-on cyber security topics. More novel approaches include the use of Second Life [24], hacking competitions [4] and capstone design courses [9].…”
Section: Tier One: Course-based Learningmentioning
confidence: 99%
“…All these studies have indicated positive feedback on utilizing games for creating cyber security awareness. However few studies including [22], [24], [26], and [27] have suggested some improvements and recommendations, while all other studies have stated positive results.…”
Section: Review Of Game Based Cyber-security Studiesmentioning
confidence: 99%