Modeling Effective Cybersecurity Training Frameworks: a Delphi Method-based Study
暂无分享,去创建一个
[1] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[2] Mark A. Harris,et al. Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum , 2015, J. Inf. Syst. Educ..
[3] Victoria Bloom,et al. Game Based Cyber Security Training: are Serious Games suitable for cyber security training? , 2016, Int. J. Serious Games.
[4] Shalin Hai-Jew. The Electronic Hive Mind and Cybersecurity , 2019, Global Cyber Security Labor Shortage and International Business Risk.
[5] Michael Molenda,et al. In Search of the Elusive ADDIE Model , 2003 .
[6] W. Clayton Allen,et al. Overview and Evolution of the ADDIE Training System , 2006 .
[7] Victor-Valeriu Patriciu,et al. Guide for designing cyber security exercises , 2009 .
[8] Pamela Goh,et al. Humans as the Weakest Link in Maintaining Cybersecurity: Building Cyber Resilience in Humans , 2021 .
[9] Hussain Aldawood,et al. Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues , 2019, Future Internet.
[10] J. Andrew Valentine,et al. Enhancing the employee security awareness model , 2006 .
[11] Malcolm Robert Pattinson,et al. Matching training to individual learning styles improves information security awareness , 2019, Inf. Comput. Secur..
[12] Wu He,et al. Enterprise cybersecurity training and awareness programs: Recommendations for success , 2019, J. Organ. Comput. Electron. Commer..
[13] Hussain Aldawood,et al. An academic review of current industrial and commercial cyber security social engineering solutions , 2019, ICCSP.
[14] Anshul Kumar,et al. Social Engineering Threats and Awareness: A Survey , 2015 .
[15] Brenda K. Wiederhold,et al. The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..
[16] Nils Ole Tippenhauer,et al. Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3 , 2017, CPS-SPC@CCS.
[17] Hussain Aldawood,et al. Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review , 2018, 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE).
[18] Jason R. C. Nurse,et al. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.
[19] L. Hamilton,et al. Continued Progress: Promising Evidence on Personalized Learning , 2015 .
[20] Karen Renaud,et al. Moving from a 'human-as-problem" to a 'human-as-solution" cybersecurity mindset , 2019, Int. J. Hum. Comput. Stud..
[21] Doris Lee,et al. Rapid Prototyping in the Instructional Design Process. , 2008 .
[22] S. Petrenko. Big Data Technologies for Cybersecurity , 2018 .
[23] Mubashar Farooq,et al. Impact of Training and Feedback on Employee Performance , 2011 .
[24] Agnė Brilingaitė,et al. A framework for competence development and assessment in hybrid cybersecurity exercises , 2020, Comput. Secur..
[25] Zuopeng Justin Zhang,et al. Cybersecurity awareness training programs: a cost-benefit analysis framework , 2021, Ind. Manag. Data Syst..
[26] Vasileios Gkioulos,et al. Key competencies for critical infrastructure cyber-security: a systematic literature review , 2021, Inf. Comput. Secur..
[27] Candace Walkington,et al. Appraising research on personalized learning: Definitions, theoretical alignment, advancements, and future directions , 2020 .
[28] Jyri Rajamäki,et al. Cybersecurity education and training in hospitals: Proactive resilience educational framework (Prosilience EF) , 2018, 2018 IEEE Global Engineering Education Conference (EDUCON).
[29] Yasuo Tan,et al. CyTrONE: An Integrated Cybersecurity Training Framework , 2017, ICISSP.
[30] John Leach,et al. Improving user security behaviour , 2003, Comput. Secur..
[31] Cuong Pham,et al. CyRIS: a cyber range instantiation system for facilitating security training , 2016, SoICT.
[32] Maheswara Rao Valluri,et al. A survey on cybersecurity awareness concerns, practices and conceptual measures , 2019, 2019 International Conference on Computer Communication and Informatics (ICCCI).
[33] John A. Gambatese,et al. Qualitative Research: Application of the Delphi Method to CEM Research , 2010 .
[34] M. McDaniel,et al. Learning Styles , 2008, Psychological science in the public interest : a journal of the American Psychological Society.
[35] Mohammed Alajmi. E-learning and ADDIE Model , 2009 .
[36] Vasileios Gkioulos,et al. Cyber security training for critical infrastructure protection: A literature review , 2021, Comput. Sci. Rev..
[37] T. L. Janssen,et al. Exploring game design for cybersecurity training , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).
[38] Yasuo Tan,et al. Integrated framework for hands-on cybersecurity training: CyTrONE , 2018, Comput. Secur..