The security reports are unambiguous: the human factor constitutes a real vulnerability in the information security domain. It is crucial that employees of companies and governments understand the risks and threats connected with use of \gls{it} systems, and act on the knowledge to prevent security breaches and leakage of sensitive information to cyber criminals or nation state espionage. It is assumed that security awareness and training programs are one of the primary ways of raising someone's conciousness and building competence in the field of information security. However, current programs are sometimes viewed as tedious and uninteresting by the employees that take them. Consequently, the programs fail to create the behaviour and compe...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Abstract: The field of cybersecurity is evolving with emerging threats. It's crucial to keep up with...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
Companies depend on internal control to protect the integrity of information systems. IT security an...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
Cybersecurity has recently emerged as a contemporary challenge for organizations around the globe. A...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Abstract: The field of cybersecurity is evolving with emerging threats. It's crucial to keep up with...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
The security reports are unambiguous: the human factor constitutes a real vulnerability in the infor...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
During a period between 2011-2014, Gamification was the next big thing. Nowadays, however, Gamificat...
Companies depend on internal control to protect the integrity of information systems. IT security an...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
It is important to take advantage of games when just getting the job done is sufficient and keeping ...
Cybersecurity has recently emerged as a contemporary challenge for organizations around the globe. A...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...
Abstract: The field of cybersecurity is evolving with emerging threats. It's crucial to keep up with...
Users have a rather low security awareness, this has led to ideas about creating a security awarenes...