[HTML][HTML] A systematic review of current cybersecurity training methods
Cybersecurity continues to be a growing issue, with cyberattacks causing financial losses
and loss of productivity and reputation. Especially in an organisational setting, end-user …
and loss of productivity and reputation. Especially in an organisational setting, end-user …
[HTML][HTML] Exploring cybersecurity education and training techniques: A comprehensive review of traditional, virtual reality, and augmented reality approaches
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …
the importance of cybersecurity education and training cannot be overstated. This paper …
Leveraging vr/ar/mr/xr technologies to improve cybersecurity education, training, and operations
Abstract The United States faces persistent threats conducting malicious cyber campaigns
that threaten critical infrastructure, companies and their intellectual property, and the privacy …
that threaten critical infrastructure, companies and their intellectual property, and the privacy …
The role of cognition in develo** successful cybersecurity training programs–passive vs. active engagement
J Prümmer - International Conference on Human-Computer …, 2024 - Springer
End-user cybersecurity, and the risks associated with it, are receiving more and more
attention, particularly in organizational settings. This increase in attention has led to a …
attention, particularly in organizational settings. This increase in attention has led to a …
Analysis of Interdependency of ICCT Underlying Technologies and Related New Research Opportunities with Special Emphasis on Cyber Security and Forensic …
Abstract Information Communication and Computation technology (ICCT) is a 21st-century
name of Information Communication Technology (ICT) that covers a broader definition of …
name of Information Communication Technology (ICT) that covers a broader definition of …
Bridging the Gap: Cyber Defence Skills for the Future
As cyber threats continue to evolve, the need for highly skilled cyber defence operators
becomes increasingly critical. In this work, we aim to provide a multidisciplinary exploration …
becomes increasingly critical. In this work, we aim to provide a multidisciplinary exploration …
Cybersecurity awareness in Saudi Arabia: A systematic literature review
R Hamdi - EDULEARN22 Proceedings, 2022 - library.iated.org
Technology changed the way people live and work through adding competitive advantages
and values of cost efficiency, information availability, knowledge documentation and …
and values of cost efficiency, information availability, knowledge documentation and …
Security Education Training and Awareness (SETA) at the Edge of the Metaverse
With the rise of cyber-attacks and incidents, cybersecurity has become a key concern for
organizations in different contexts. Considering that these attacks mostly rely on exploiting …
organizations in different contexts. Considering that these attacks mostly rely on exploiting …
Coupling Agent-Based Simulations and VR universes: the case of GAMA and Unity
Agent-based models (ABMs) and video games, including those taking advantage of virtual
reality (VR), have undergone a remarkable parallel evolution, achieving impressive levels of …
reality (VR), have undergone a remarkable parallel evolution, achieving impressive levels of …
Revolutionizing Cybersecurity Training: An Empirical Study on the Relationship Between Traditional Methods and Interest in Virtual Reality Modules
S Rana, R Chicone - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Effective training is essential to protect the cybersecurity of information systems. However,
traditional cybersecurity training faces difficulties in terms of effectiveness, engagement …
traditional cybersecurity training faces difficulties in terms of effectiveness, engagement …