Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Business

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu Nov 2023

Preparing Uk Students For The Workplace: The Acceptability Of A Gamified Cybersecurity Training, Oliver J. Mason, Siobhan Collman, Stella Kazamia, Ioana Boureanu

Journal of Cybersecurity Education, Research and Practice

This pilot study aims to assess the acceptability of Open University’s training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post experimental design was employed. 43 self-selected participants were recruited via an online register and posters at the university (excluding IT related courses). Participants completed the Human Aspects of Information Security Questionnaire (HAIS-Q) and Fear of Missing Out (FoMO) Scale. They then completed all games and quizzes in the GICAST course before repeating the HAIS-Q and …


How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang Jul 2023

How Effective Are Seta Programs Anyway: Learning And Forgetting In Security Awareness Training, David Sikolia, David Biros, Tianjian Zhang

Journal of Cybersecurity Education, Research and Practice

Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Specifically, with a broad range of cybersecurity knowledge crammed into in a single SETA session, it is unclear how effective different types of knowledge are in mitigating human errors in a longitudinal setting. his study investigates how knowledge gained through SETA programs affects human errors in cybersecurity to fill the longitudinal void. In a baseline experiment, we establish that SETA programs reduce …


An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman Jul 2021

An Exploratory Study Of Mode Efficacy In Cybersecurity Training, Michael D. Workman

Journal of Cybersecurity Education, Research and Practice

Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of various training methods and modes, and those that have been conducted have yielded inconsistent findings. Recent literature on the use of gamified simulations have suggested that they may improve cybersecurity behaviors. Similarly, live activities such as hackathons and capture the flag events have been surmised to augment learning and capabilities. We conducted an exploratory …


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis Jun 2017

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure of …


Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian Jan 2015

Soft-Skills Training And Cultural Sensitization Of Indian Bpo Workers: A Qualitative Study, Ramesh Subramanian

Communications of the IIMA

This paper describes a study of soft-skills training at a large Business Process Outsourcing Firm located in Bangalore, India. Soft-skills training pertains to social and customer handling skills in addition to cultural sensitization of Indians to other cultures. Soft-skills are very important for the success of BPO firms, yet there is not much in the literature that addresses soft-skills training of BPO workers. This study attempts to bridge the gap. It adopts a qualitative approach using a combination of methods such as the long interview, secondary sources research and actual observation. The results are used to develop a framework for …


A Model Of Jordanian Firm’S Trainees’ Acceptance Of A Web-Based Training, Amin A. Shaqrah, Al Hareth Abu Husain Jan 2014

A Model Of Jordanian Firm’S Trainees’ Acceptance Of A Web-Based Training, Amin A. Shaqrah, Al Hareth Abu Husain

Journal of International Technology and Information Management

This study investigates E-learning technologies such as web based training “WBT” as a one of many products which wide used in all corporate training for delivering educational content to their employees. In order to achieve a better view and validate the study, researcher attempts to give details of how technology acceptance models help Jordanian trainees firms in accepting e- learning technology, and how if applied will result more attention to usage behavior. The empirical examination of study model which developed based on Unified Theory of Acceptance and Use of Technology ”UTAUT” which indicates that the Jordanian trainees’ firms’ usage behavior …


Cultural Issues In Software Estimation: From Intuition To Model Based Estimation In Upgrade Projects, Sanjay Mohapatra Jan 2009

Cultural Issues In Software Estimation: From Intuition To Model Based Estimation In Upgrade Projects, Sanjay Mohapatra

Journal of International Technology and Information Management

This paper discusses issues related to change in culture that happens when software estimation becomes scientific, methodical and predictive. From a person based intuitive approach to model based estimation techniques, the approach necessitates a change in mindset and culture. This change in culture has been noticed in upgrade projects. Upgrades play an important role in product life cycle. A product is released with required features to meet immediate requirements of the customers. Any additional or modifications to features are carried through upgrade projects. These upgrades planned well in advance by the product developing organizations are made available to customers through …