[HTML][HTML] A systematic review of current cybersecurity training methods

J Prümmer, T van Steen, B van den Berg - Computers & Security, 2024 - Elsevier
Cybersecurity continues to be a growing issue, with cyberattacks causing financial losses
and loss of productivity and reputation. Especially in an organisational setting, end-user …

[HTML][HTML] Review of Smart-Home Security Using the Internet of Things

G Vardakis, G Hatzivasilis, E Koutsaki, N Papadakis - Electronics, 2024 - mdpi.com
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …

EMPLOYEE CYBERSECURITY AWARENESS TRAINING PROGRAMS CUSTOMIZED FOR SME CONTEXTS TO REDUCE HUMAN-ERROR RELATED SECURITY …

F Ugbebor, O Aina, M Abass, D Kushanu - Journal of Knowledge Learning …, 2024 - jklst.org
Introduction: Employee cybersecurity awareness training programs in Small and
Mediumsized Enterprises (SMEs) have become increasingly critical as organizations face …

Empowering students for cybersecurity awareness management in the emerging digital era: the role of cybersecurity attitude in the 4.0 industrial revolution era

B Ahamed, MRH Polas, AI Kabir… - Sage …, 2024 - journals.sagepub.com
The purpose of the study is to examine how cybersecurity knowledge, password security,
and self-perception of skill affect cybersecurity awareness issues via the mediating lens of …

Overcoming remote workforce cyber threats: A comprehensive ransomware and bot net defense strategy utilizing VPN networks

OS Ogungbemi, FA Ezeugwa, OO Olaniyi… - Available at SSRN …, 2024 - papers.ssrn.com
This study investigates endpoint security strategies for remote workforces utilizing VPN
networks, focusing on mitigating ransomware and botnet attacks. A mixed-methods …

[HTML][HTML] Balancing software and training requirements for information security

D Fujs, S Vrhovec, D Vavpotič - Computers & security, 2023 - Elsevier
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …

Smart environment for adaptive learning of cybersecurity skills

J Vykopal, P Seda, V Švábenský… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Hands-on computing education requires a realistic learning environment that enables
students to gain and deepen their skills. Available learning environments, including virtual …

Formación y concienciación en ciberseguridad basada en competencias: una revisión sistemática de literatura:[Competency-based cybersecurity training and …

JM Caldentey, BS Urquijo, MG Almazor - Pixel-Bit. Revista de Medios …, 2022 - recyt.fecyt.es
La capacidad de una organización para hacer frente a las amenazas y vulnerabilidades
depende en gran medida de los niveles de formación y concienciación en ciberseguridad …

Building maritime cybersecurity capacity against ransomware attacks

G Potamos, S Theodoulou, E Stavrou… - Proceedings of the …, 2023 - Springer
Ransomware is considered among the top threats that organizations have to face, and one
that is not expected to go away anytime soon. Cyber criminals have turned ransomware into …

Zero-knowledge proof intelligent recommendation system to protect students' data privacy in the digital age

W Yin - Applied Artificial Intelligence, 2023 - Taylor & Francis
The rapid digital revolution in recent decades has resulted in an overwhelming amount of
information, particularly in the realm of modern education systems and related materials …