During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamification has been established as a legitimate research topic with several dedicated conferences. This report aims to shed light on the existing literature within the area through a literature review and highlight existing gaps. Further, this paper strives towards showcasing some of the effects that Gamification could have on information security awareness to combat the vast amounts of security-related incidents in today's organizations. Moreover, that security incidents are frequent and often expensive, and sometimes occur due to employee negligence gives organizations incentives to educate its workforce in security training and awareness sessions...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Abstract—The fields of security and usability often conflict with each other. Security focuses on ma...
This paper presents the rationale for the design of a card deck game sustaining information security...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Cybersecurity has recently emerged as a contemporary challenge for organizations around the globe. A...
Companies depend on internal control to protect the integrity of information systems. IT security an...
In this study the effects of gamification in business processes are examined, and the possibility of...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Abstract—The fields of security and usability often conflict with each other. Security focuses on ma...
This paper presents the rationale for the design of a card deck game sustaining information security...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Cybersecurity has recently emerged as a contemporary challenge for organizations around the globe. A...
Companies depend on internal control to protect the integrity of information systems. IT security an...
In this study the effects of gamification in business processes are examined, and the possibility of...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Abstract—The fields of security and usability often conflict with each other. Security focuses on ma...
This paper presents the rationale for the design of a card deck game sustaining information security...