[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …
levels, including a vast array of programs and modules tailored to specific sectors of industry …
EMPLOYEE CYBERSECURITY AWARENESS TRAINING PROGRAMS CUSTOMIZED FOR SME CONTEXTS TO REDUCE HUMAN-ERROR RELATED SECURITY …
F Ugbebor, O Aina, M Abass, D Kushanu - Journal of Knowledge Learning …, 2024 - jklst.org
Introduction: Employee cybersecurity awareness training programs in Small and
Mediumsized Enterprises (SMEs) have become increasingly critical as organizations face …
Mediumsized Enterprises (SMEs) have become increasingly critical as organizations face …
Analysing the role of modern information technologies in HRM: management perspective and future agenda
Purpose The objective of this study is to analyse the integration of technology in Human
Resources Management (HRM) with a special focus on Artificial Intelligence (AI), Machine …
Resources Management (HRM) with a special focus on Artificial Intelligence (AI), Machine …
Factors affecting risky cybersecurity behaviors by US workers: An exploratory study
AR Gillam, WT Foster - Computers in Human Behavior, 2020 - Elsevier
Behavioral determinants of cybersecurity have gained greater attention among information
technology experts in recent years. However, drivers of risky cybersecurity behavior have …
technology experts in recent years. However, drivers of risky cybersecurity behavior have …
An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness TRAining Model (CATRAM). A Case Study …
Traditional cybersecurity, security or information security awareness programs have become
ineffective to change people's behavior in recognizing, failing to block or reporting …
ineffective to change people's behavior in recognizing, failing to block or reporting …
[HTML][HTML] Balancing software and training requirements for information security
Abstract Information security is one of the key areas of consideration to assure reliable and
dependable information systems (IS). Achieving an appropriate level of IS security requires …
dependable information systems (IS). Achieving an appropriate level of IS security requires …
[LIBRO][B] GDPR and Cyber Security for Business Information Systems
A Gobeo, C Fowler, WJ Buchanan - 2022 - taylorfrancis.com
The General Data Protection Regulation is the latest, and one of the most stringent,
regulations regarding Data Protection to be passed into law by the European Union …
regulations regarding Data Protection to be passed into law by the European Union …
Citizen-centric cybersecurity model for promoting good cybersecurity behaviour
G Mahlangu, C Chipfumbu Kangara… - Journal of Cyber …, 2023 - Taylor & Francis
The ultimate success of cybersecurity partly depends on good behaviours by Internet users.
However, good cybersecurity behaviour is a major challenge among citizens because they …
However, good cybersecurity behaviour is a major challenge among citizens because they …
[PDF][PDF] The impact of enhancing awareness of cybersecurity on universities students: a survey paper
M Mohammed, DM Bamasoud - Journal of Theoretical and Applied …, 2022 - jatit.org
The great technological development and digital transformations that the world is witnessing
increase the rate of cyber threats and cybercrime, and due to the Covid19 pandemic …
increase the rate of cyber threats and cybercrime, and due to the Covid19 pandemic …
Privacy and cybersecurity challenges, opportunities, and recommendations: Personnel selection in an era of online application systems and big data.
Big data is being used to evaluate applicants. This chapter describes the use of online
systems and big data in the context of the job application process, with an emphasis on …
systems and big data in the context of the job application process, with an emphasis on …