Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (2)
- Curriculum development (1)
- Cyber terrorism (1)
- Information security (1)
- Information security awareness (1)
-
- Information security education (1)
- Information security toolkit (1)
- Interdisciplinary education. (1)
- Mixed method (1)
- National security (1)
- Perspectives (1)
- Q methodology (1)
- Serious Gaming; Social Engineering; Human Factor; Information Security; Experiential Learning; Field Observation; Business and Management Environment (1)
- Subjectivity (1)
- Terrorism (1)
Articles 1 - 4 of 4
Full-Text Articles in Management Information Systems
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
A Serious Game For Social Engineering Awareness Creation, Fabian Muhly, Philipp Leo, Stefano Caneppele
Journal of Cybersecurity Education, Research and Practice
Social engineering is a method used by offenders to deceive their targets utilizing rationales of human psychology. Offenders aim to exploit information and use them for intelligence purposes or financial gains. Generating resilience against these malicious methods is still challenging. Literature shows that serious gaming learning approaches are used more frequently to instill lasting retention effects. Serious games are interactive, experiential learning approaches that impart knowledge about rationales and concepts in a way that fosters retention. In three samples and totally 97 participants the study at hand evaluated a social engineering serious game for participants’ involvement and instruction compliance during …
Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas
Divergent Student Views Of Cybersecurity, Susan E. Ramlo, John B. Nicholas
Journal of Cybersecurity Education, Research and Practice
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study subjectivity. Within a Q study, various stages as well as philosophical, epistemological, and ontological principles represent a complete methodology. At first, Q researchers collect items that represent the broad range of communications about the topic (called the concourse). Although the items can be pictures, scents, or other means of communication, …
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
Journal of Cybersecurity Education, Research and Practice
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …