Security challenges in industry 4.0 plc systems
The concept of the fourth industrial revolution assumes the integration of people and digitally
controlled machines with the Internet and information technologies. At the end of 2015, more …
controlled machines with the Internet and information technologies. At the end of 2015, more …
Planning for Cyber Security in Schools: The Human Factor.
MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …
century. Computer security is an essential instrument for protecting children, but K-12 …
Cybersecurity training acceptance: A literature review
User behavior is widely acknowledged as a crucial part of cybersecurity, and training is the
most commonly suggested way of ensuring secure behavior. However, an open challenge is …
most commonly suggested way of ensuring secure behavior. However, an open challenge is …
[HTML][HTML] Design principles for cognitively accessible cybersecurity training
Exploiting human behavior to gain unauthorized access to computer systems has become
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …
User perception of Context-Based Micro-Training–a method for cybersecurity training
User behavior is one of the biggest challenges to cybersecurity in modern organizations.
Users are continuously targeted by attackers and required to have sufficient knowledge to …
Users are continuously targeted by attackers and required to have sufficient knowledge to …
A taxonomy of SETA methods and linkage to delivery preferences
Cybersecurity threats targeting users are common in today's information systems. Threat
actors exploit human behavior to gain unauthorized access to systems and data. The …
actors exploit human behavior to gain unauthorized access to systems and data. The …
A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems
The focus on cyber security as an interaction between technical elements and humans has
typically confined consideration of the latter to practical issues of implementation …
typically confined consideration of the latter to practical issues of implementation …
Context-Based Micro-Training: Enhancing cybersecurity training for end-users
J Kävrestad - 2022 - diva-portal.org
This research addresses the human aspect of cybersecurity by develo** a method for
cybersecurity training of end-users. The reason for addressing that area is that human …
cybersecurity training of end-users. The reason for addressing that area is that human …
ContextBased MicroTraining: A framework for information security training
This paper address the emergent need for training measures designed to improve user
behavior in regards to security. We do this by proposing a framework for information security …
behavior in regards to security. We do this by proposing a framework for information security …
Evaluation strategies for cybersecurity training methods: a literature review
The human aspect of cybersecurity continues to present challenges to researchers and
practitioners worldwide. While measures are being taken to improve the situation, a vast …
practitioners worldwide. While measures are being taken to improve the situation, a vast …