Today, many products and solutions are provided on the cloud; however, the amount and financial losses due to cloud security incidents illustrate the critical need to do more to protect cloud assets adequately. A gap lies in transferring what cloud and security standards recommend and require to industry practitioners working in the front line. It is of paramount importance to raise awareness about cloud security of these industrial practitioners. Under the guidance of design science paradigm, we introduce a serious game to help participants understand the inherent risks, understand the different roles, and encourage proactive defensive thinking in defending cloud assets. In our game, we designed and implemented an automated evaluator as a ...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
Industrial control organizations need to perform IT security preparedness exercises more frequently ...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
Nowadays, companies are increasingly using cloud-based platform for its convenience and flexibility....
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
In recent years, the market of cloud services has been growing rapidly. Consequently, cloud security...
Stackelberg games may reveal to be extremely useful in supporting decisions in attack-defense scenar...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
Nowadays, the security of the Internet is always dressing severe challenges. To achieve network syst...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Social engineering is now a major threat to users and systems in the online context, and it is there...
Cyber attacks are increasing in number and sophistication, causing organisations to continuously ada...
Cloud computing has the benefit of offering scalability and efficiency, as well as cost-effectivenes...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
Industrial control organizations need to perform IT security preparedness exercises more frequently ...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
Nowadays, companies are increasingly using cloud-based platform for its convenience and flexibility....
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
In recent years, the market of cloud services has been growing rapidly. Consequently, cloud security...
Stackelberg games may reveal to be extremely useful in supporting decisions in attack-defense scenar...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
Nowadays, the security of the Internet is always dressing severe challenges. To achieve network syst...
Information is necessary for any business to function. However, if one does not manage one’s informa...
Social engineering is now a major threat to users and systems in the online context, and it is there...
Cyber attacks are increasing in number and sophistication, causing organisations to continuously ada...
Cloud computing has the benefit of offering scalability and efficiency, as well as cost-effectivenes...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Cyber attacks have been increasing, and there have been many media reports of attacks against large ...
Industrial control organizations need to perform IT security preparedness exercises more frequently ...