Modeling Effective Cybersecurity Training Frameworks: a Delphi Method-based Study

[1]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[2]  Mark A. Harris,et al.  Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum , 2015, J. Inf. Syst. Educ..

[3]  Victoria Bloom,et al.  Game Based Cyber Security Training: are Serious Games suitable for cyber security training? , 2016, Int. J. Serious Games.

[4]  Shalin Hai-Jew The Electronic Hive Mind and Cybersecurity , 2019, Global Cyber Security Labor Shortage and International Business Risk.

[5]  Michael Molenda,et al.  In Search of the Elusive ADDIE Model , 2003 .

[6]  W. Clayton Allen,et al.  Overview and Evolution of the ADDIE Training System , 2006 .

[7]  Victor-Valeriu Patriciu,et al.  Guide for designing cyber security exercises , 2009 .

[8]  Pamela Goh,et al.  Humans as the Weakest Link in Maintaining Cybersecurity: Building Cyber Resilience in Humans , 2021 .

[9]  Hussain Aldawood,et al.  Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.

[10]  J. Andrew Valentine,et al.  Enhancing the employee security awareness model , 2006 .

[11]  Malcolm Robert Pattinson,et al.  Matching training to individual learning styles improves information security awareness , 2019, Inf. Comput. Secur..

[12]  Wu He,et al.  Enterprise cybersecurity training and awareness programs: Recommendations for success , 2019, J. Organ. Comput. Electron. Commer..

[13]  Hussain Aldawood,et al.  An academic review of current industrial and commercial cyber security social engineering solutions , 2019, ICCSP.

[14]  Anshul Kumar,et al.  Social Engineering Threats and Awareness: A Survey , 2015 .

[15]  Brenda K. Wiederhold,et al.  The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..

[16]  Nils Ole Tippenhauer,et al.  Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 , 2017, CPS-SPC@CCS.

[17]  Hussain Aldawood,et al.  Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review , 2018, 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE).

[18]  Jason R. C. Nurse,et al.  Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.

[19]  L. Hamilton,et al.  Continued Progress: Promising Evidence on Personalized Learning , 2015 .

[20]  Karen Renaud,et al.  Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset , 2019, Int. J. Hum. Comput. Stud..

[21]  Doris Lee,et al.  Rapid Prototyping in the Instructional Design Process. , 2008 .

[22]  S. Petrenko Big Data Technologies for Cybersecurity , 2018 .

[23]  Mubashar Farooq,et al.  Impact of Training and Feedback on Employee Performance , 2011 .

[24]  Agnė Brilingaitė,et al.  A framework for competence development and assessment in hybrid cybersecurity exercises , 2020, Comput. Secur..

[25]  Zuopeng Justin Zhang,et al.  Cybersecurity awareness training programs: a cost-benefit analysis framework , 2021, Ind. Manag. Data Syst..

[26]  Vasileios Gkioulos,et al.  Key competencies for critical infrastructure cyber-security: a systematic literature review , 2021, Inf. Comput. Secur..

[27]  Candace Walkington,et al.  Appraising research on personalized learning: Definitions, theoretical alignment, advancements, and future directions , 2020 .

[28]  Jyri Rajamäki,et al.  Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF) , 2018, 2018 IEEE Global Engineering Education Conference (EDUCON).

[29]  Yasuo Tan,et al.  CyTrONE: An Integrated Cybersecurity Training Framework , 2017, ICISSP.

[30]  John Leach,et al.  Improving user security behaviour , 2003, Comput. Secur..

[31]  Cuong Pham,et al.  CyRIS: a cyber range instantiation system for facilitating security training , 2016, SoICT.

[32]  Maheswara Rao Valluri,et al.  A survey on cybersecurity awareness concerns, practices and conceptual measures , 2019, 2019 International Conference on Computer Communication and Informatics (ICCCI).

[33]  John A. Gambatese,et al.  Qualitative Research: Application of the Delphi Method to CEM Research , 2010 .

[34]  M. McDaniel,et al.  Learning Styles , 2008, Psychological science in the public interest : a journal of the American Psychological Society.

[35]  Mohammed Alajmi E-learning and ADDIE Model , 2009 .

[36]  Vasileios Gkioulos,et al.  Cyber security training for critical infrastructure protection: A literature review , 2021, Comput. Sci. Rev..

[37]  T. L. Janssen,et al.  Exploring game design for cybersecurity training , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[38]  Yasuo Tan,et al.  Integrated framework for hands-on cybersecurity training: CyTrONE , 2018, Comput. Secur..