Visual Programming in Cyber Range Training to Improve Skill Development
|
2022 |
Glas, Magdalena |
COLTRANE -— Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education
|
2022 |
Andriessen, Jerry |
CAP: Patching the Human Vulnerability
|
2022 |
Eze, Thaddeus |
Security Culture in Industrial Control Systems Organisations: A Literature Review
|
2022 |
Evripidou, Stefanos |
Systematic Review of Factors that Influence the Cybersecurity Culture
|
2022 |
Mwim, Emilia N. |
Cyber4Dev Security Culture Model for African Countries
|
2022 |
Reppoh, Victor |
A Model for Information Security Culture with Innovation and Creativity as Enablers
|
2022 |
Veiga, Adéle da |
How Privacy Concers Impact Swedish Citizens’ Willingness to Report Crimes
|
2022 |
Lindqvist, Gunnar |
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
|
2022 |
Aldaraani, Najla |
Exploring CyBOK with Topic Modeling Techniques
|
2022 |
Gonzalez-Tablas, Ana I. |
Cybersecurity Knowledge Requirements for a Water Sector Employee
|
2022 |
Thomani, R. |
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared
|
2022 |
Ahmad, Rufai |
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results
|
2022 |
Shanley, Leah |
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities
|
2022 |
Pilane, Karabo |
Policy Components - A Conceptual Model for Tailoring Information Security Policies
|
2022 |
Rostami, Elham |
A Novel Framework for the Development of Age Appropriate Information Security Serious Games
|
2022 |
Serfontein, Rudi |
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective
|
2022 |
Padayachee, Keshnee |
Security Fatigue: A Case Study of Data Specialists
|
2022 |
Bhana, Anusha |
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator
|
2022 |
Mbewe, Enock Samuel |
Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Training
|
2022 |
Kävrestad, Joakim |