4.5 Review

A systematic review of current cybersecurity training methods

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Education & Educational Research

The effectiveness of technology-facilitated personalized learning on learning achievements and learning perceptions: a meta-analysis

Lanqin Zheng et al.

Summary: This study conducted a comprehensive meta-analysis to examine the effect sizes of technology-facilitated personalized learning on learning achievements and learning perceptions. The findings showed that technology-facilitated personalized learning had a medium effect size on learning achievements and a small effect size on learning perceptions. Additionally, it was found that learning methods and personalized learning software significantly moderated the effect sizes.

EDUCATION AND INFORMATION TECHNOLOGIES (2022)

Article Computer Science, Information Systems

Applying social marketing to evaluate current security education training and awareness programs in organisations

Moneer Alshaikh et al.

Summary: This paper discusses the shortcomings of existing Security Education, Training and Awareness programs, which focus on knowledge acquisition rather than behavior change. Research reveals that these programs fail to implement key principles of social marketing, limiting their effectiveness in promoting positive behavior change. A new development process based on social marketing principles is proposed to enable Security Education, Training and Awareness programs to focus more on behavior change initiatives.

COMPUTERS & SECURITY (2021)

Article Chemistry, Multidisciplinary

Assessing the Effects of Gamification on Enhancing Information Security Awareness Knowledge

Tienhua Wu et al.

Summary: The study shows that using gamification as a teaching method can effectively enhance students' Information Security Awareness (ISA), especially in the areas of password management, Internet use, and information handling. However, gamification does not have a significant impact on students' attitudes and intentions towards security compliance, as well as their willingness for continuous IS learning.

APPLIED SCIENCES-BASEL (2021)

Review Surgery

The PRISMA 2020 statement: An updated guideline for reporting systematic reviews

Matthew J. Page et al.

Summary: The PRISMA 2020 statement, an updated version of the 2009 statement, includes new reporting guidance that reflects advances in research methods. This article introduces the PRISMA 2020 27-item checklist and related information.

INTERNATIONAL JOURNAL OF SURGERY (2021)

Review Computer Science, Information Systems

Cyber security training for critical infrastructure protection: A literature review

Nabin Chowdhury et al.

Summary: Cybersecurity training programs are available in various educational settings but there is no consensus on the best measures and methods. This study focuses on critical infrastructure protection in aviation, energy, and nuclear sectors. Results indicate a preference for hands-on experience and team skills development, with simulation-based solutions showing high levels of research and development. However, researchers have not agreed on optimal training delivery methods and exercise design.

COMPUTER SCIENCE REVIEW (2021)

Review Computer Science, Information Systems

Enhancing employees information security awareness in private and public organisations: A systematic literature review

Khando Khando et al.

Summary: Preserving the confidentiality, integrity, and availability of an organization's sensitive information systems assets against attacks and threats is a challenge in the digital age. The study highlights the importance of employee information security awareness in preventing undesirable behaviors, and offers insights into methods and factors used to enhance ISA in private and public organizations. The results show that various methods and factors are employed to enhance employees' ISA, with theoretical models and gamification being widely used across sectors.

COMPUTERS & SECURITY (2021)

Article Computer Science, Software Engineering

Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training

Radek Oslejsek et al.

Summary: Hands-on training is an effective way to improve cybersecurity skills, and this article explores the application of visual analytics principles in training course design. A conceptual model is proposed to support users' sensemaking activities throughout the training life cycle, drawing from the authors' experience in organizing diverse hands-on cybersecurity training sessions.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2021)

Article Education & Educational Research

CySecEscape 2.0-A Virtual Escape Room To Raise Cybersecurity Awareness

Emanuel Loffler et al.

Summary: This study transformed a physical escape room game into a virtual learning experience to increase flexibility during Covid-19 lockdown. While finding feasibility in maintaining player immersion, a limitation was identified in teaching targeted social engineering attacks.

INTERNATIONAL JOURNAL OF SERIOUS GAMES (2021)

Article Computer Science, Cybernetics

Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks

Bora Kim et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2020)

Article Computer Science, Information Systems

Can individuals' neutralization techniques be overcome? A field experiment on password policy

Mikko Siponen et al.

COMPUTERS & SECURITY (2020)

Article Chemistry, Multidisciplinary

Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees

George Hatzivasilis et al.

APPLIED SCIENCES-BASEL (2020)

Article Social Sciences, Interdisciplinary

What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?

Tommy van Steen et al.

JOURNAL OF CYBERSECURITY (2020)

Article Computer Science, Interdisciplinary Applications

Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model

Aymen Hamoud et al.

FRONTIERS IN COMPUTER SCIENCE (2020)

Article Education & Educational Research

Adaptive security awareness training using linked open data datasets

Zheyu Tan et al.

EDUCATION AND INFORMATION TECHNOLOGIES (2020)

Review Education & Educational Research

Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games

Merijke Coenraad et al.

SIMULATION & GAMING (2020)

Article Computer Science, Information Systems

Design and Evaluation of an Augmented Reality Game for Cybersecurity Awareness (CybAR)

Hamed Alqahtani et al.

INFORMATION (2020)

Article Computer Science, Software Engineering

Improving software security awareness using a serious game

Affan Yasin et al.

IET SOFTWARE (2019)

Article Computer Science, Information Systems

Enterprise cybersecurity training and awareness programs: Recommendations for success

Wu He et al.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2019)

Article Computer Science, Information Systems

Evaluating the effectiveness of learner controlled information security training

Sherly Abraham et al.

COMPUTERS & SECURITY (2019)

Article Multidisciplinary Sciences

Informing, simulating experience, or both: A field experiment on phishing risks

Aurellen Baillon et al.

PLOS ONE (2019)

Article Education & Educational Research

Supporting cybersecurity education and training via LMS integration: CyLMS

Razvan Beuran et al.

EDUCATION AND INFORMATION TECHNOLOGIES (2019)

Article Multidisciplinary Sciences

Effectiveness of and user preferences for security awareness training methodologies

Kai Florian Tschakert et al.

HELIYON (2019)

Article Information Science & Library Science

Online social network security awareness: mass interpersonal persuasion using a Facebook app

Ehinome Ikhalia et al.

INFORMATION TECHNOLOGY & PEOPLE (2019)

Article Health Care Sciences & Services

Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization

Mubashir Aslam Arain et al.

JOURNAL OF MULTIDISCIPLINARY HEALTHCARE (2019)

Article Computer Science, Information Systems

Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system

William J. Gordon et al.

JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION (2019)

Article Education & Educational Research

Autonomy Motivators, Serious Games, and Intention Toward ISP Compliance

Ahmed Alzahrani et al.

INTERNATIONAL JOURNAL OF SERIOUS GAMES (2019)

Article Computer Science, Information Systems

Integrated framework for hands-on cybersecurity training: CyTrONE

Razvan Beuran et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

Affan Yasin et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2018)

Article Computer Science, Information Systems

Development of cyber information security education and training system

Bong-Hyun Kim et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

Puhakainen et al.

MIS QUARTERLY (2017)

Article Geosciences, Multidisciplinary

On the Complexity of Cybersecurity Exercises Proportional to Preparedness

Tomomi Aoyama et al.

JOURNAL OF DISASTER RESEARCH (2017)

Article Telecommunications

Design of Security Training System for Individual Users

Il-kwon Lim et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Education & Educational Research

Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

Maurice Hendrix et al.

INTERNATIONAL JOURNAL OF SERIOUS GAMES (2016)

Article Medicine, General & Internal

Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement

David Moher et al.

SYSTEMATIC REVIEWS (2015)

Article Computer Science, Cybernetics

User preference of cyber security awareness delivery methods

Jemal Abawajy

BEHAVIOUR & INFORMATION TECHNOLOGY (2014)

Article Health Policy & Services

Public Awareness Campaigns About Depression and Suicide: A Review

Hélène Dumesnil et al.

PSYCHIATRIC SERVICES (2014)

Article Computer Science, Cybernetics

Phishing for phishing awareness

K. Jansson et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2013)

Article Computer Science, Information Systems

Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior

Jeffrey L. Jenkins et al.

JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2013)

Article Education & Educational Research

Personalised learning: lessons to be learnt

Vaughan Prain et al.

BRITISH EDUCATIONAL RESEARCH JOURNAL (2013)

Article Engineering, Electrical & Electronic

IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS

T. Gundu et al.

SAIEE AFRICA RESEARCH JOURNAL (2013)

Article Psychology, Clinical

Promoting habit formation

Phillippa Lally et al.

HEALTH PSYCHOLOGY REVIEW (2013)

Review Education & Educational Research

Physical activity mass media campaigns and their evaluation: a systematic review of the literature 2003-2010

Justine E. Leavy et al.

HEALTH EDUCATION RESEARCH (2011)

Article Education & Educational Research

Information Security Awareness On-Line Materials Design with Knowledge Maps

Ruey-Shiang Shaw et al.

INTERNATIONAL JOURNAL OF DISTANCE EDUCATION TECHNOLOGIES (2011)

Article Business

Influence of Awareness and Training on Cyber Security

Kevin McCrohan et al.

JOURNAL OF INTERNET COMMERCE (2010)

Article Computer Science, Cybernetics

The intention-behaviour gap in technology usage: the moderating role of attitude strength

A. Bhattacherjee et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2009)

Article Computer Science, Interdisciplinary Applications

The impact of information richness on information security awareness training effectiveness

R. S. Shaw et al.

COMPUTERS & EDUCATION (2009)

Article Computer Science, Information Systems

A video game for cyber security training and awareness

Benjamin D. Cone et al.

COMPUTERS & SECURITY (2007)

Article Health Care Sciences & Services

Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings

M Eccles et al.

JOURNAL OF CLINICAL EPIDEMIOLOGY (2005)