首页 > 最新文献

Cybersecurity Education for Awareness and Compliance最新文献

英文 中文
A Holistic View of Cybersecurity Education Requirements 网络安全教育要求的整体观点
Pub Date : 2019-03-01 DOI: 10.4018/978-1-5225-7847-5.CH001
S. Furnell, Ismini Vasileiou
This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the practitioner level (in terms of a skills shortage). The discussion highlights the importance of a holistic approach, covering both personal and workplace use, and addressing the spectrum from end-users through to cybersecurity specialists.
本章为整本书设定了场景,建立了网络安全意识、培训和教育的必要性,以使我们能够理解并履行我们的安全义务。它首先说明了应该构成网络安全素养一部分的关键要素,以及在解决这个问题时要问的问题。然后,它审查了传统上在实现意识和教育方面存在的问题,包括在用户一级(在缺乏支持方面)和从业者一级(在技能短缺方面)。讨论强调了整体方法的重要性,包括个人和工作场所的使用,并解决了从最终用户到网络安全专家的范围。
{"title":"A Holistic View of Cybersecurity Education Requirements","authors":"S. Furnell, Ismini Vasileiou","doi":"10.4018/978-1-5225-7847-5.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH001","url":null,"abstract":"This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the practitioner level (in terms of a skills shortage). The discussion highlights the importance of a holistic approach, covering both personal and workplace use, and addressing the spectrum from end-users through to cybersecurity specialists.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115358064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cybersecurity Skills Framework 网络安全技能框架
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH011
Peter Fischer
This chapter traces the evolution of cybersecurity skills requirements and development over the past 40 years, from the early days of computer security (Compusec) to the present day. The development of cybersecurity skills is traced from an initial focus upon national security and confidentiality through to the current recognition as business driver. The main part of the chapter concentrates on the development of a specific skills framework from the Institute of Information Security Professionals. Originally conceived in 2006 and initially used for purposes of membership accreditation, the IISP Skills Framework has since been used extensively by commerce, industry, government and academia in the UK and more widely. Version 2 of the framework was published in 2016, and the chapter discussion outlines both the original structure and the notable changes in the later release. These developments collectively illustrate the ongoing recognition of cybersecurity skills, as well as the evolution of the skills themselves.
本章追溯了过去40年来网络安全技能要求和发展的演变,从早期的计算机安全(Compusec)到现在。网络安全技能的发展可以追溯到最初对国家安全和保密的关注,直到目前被视为业务驱动因素。本章的主要部分集中于信息安全专业人员协会的特定技能框架的发展。IISP技能框架最初构思于2006年,最初用于会员认证目的,此后被英国的商业,工业,政府和学术界广泛使用,甚至更广泛。该框架的第2版于2016年发布,章节讨论概述了原始结构和后来版本中值得注意的变化。这些发展共同说明了对网络安全技能的持续认可,以及技能本身的演变。
{"title":"A Cybersecurity Skills Framework","authors":"Peter Fischer","doi":"10.4018/978-1-5225-7847-5.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH011","url":null,"abstract":"This chapter traces the evolution of cybersecurity skills requirements and development over the past 40 years, from the early days of computer security (Compusec) to the present day. The development of cybersecurity skills is traced from an initial focus upon national security and confidentiality through to the current recognition as business driver. The main part of the chapter concentrates on the development of a specific skills framework from the Institute of Information Security Professionals. Originally conceived in 2006 and initially used for purposes of membership accreditation, the IISP Skills Framework has since been used extensively by commerce, industry, government and academia in the UK and more widely. Version 2 of the framework was published in 2016, and the chapter discussion outlines both the original structure and the notable changes in the later release. These developments collectively illustrate the ongoing recognition of cybersecurity skills, as well as the evolution of the skills themselves.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"10852 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ensuring Core Competencies for Cybersecurity Specialists 确保网络安全专家的核心竞争力
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH007
G. Dhillon, Kane J. Smith, Karin Hedström
Within an organization, it is critical that all employees possess a security awareness and thus play a part in the protection of said organization's information assets. Some employees will have key roles and responsibilities and require specific skills to support them. However, organizations can face challenges in regard to recognizing the required specialized skills as well as where to obtain them. For this reason, whether an organization chooses to hire new staff, developing existing staff, or outsource the activities altogether, it is necessary to know the type and level of expertise required. To this end, this chapter discusses the need for organizations to understand and identify the essential skills related to cybersecurity in order for their employees to develop core competencies in these areas.
在一个组织中,所有员工都必须具备安全意识,从而在保护组织的信息资产方面发挥作用,这一点至关重要。一些员工将有关键的角色和职责,需要特定的技能来支持他们。然而,组织在识别所需的专业技能以及从哪里获得这些技能方面可能面临挑战。因此,无论组织是选择雇用新员工,发展现有员工,还是将活动全部外包,都有必要了解所需专业知识的类型和水平。为此,本章讨论了组织了解和确定与网络安全相关的基本技能的必要性,以便其员工在这些领域培养核心竞争力。
{"title":"Ensuring Core Competencies for Cybersecurity Specialists","authors":"G. Dhillon, Kane J. Smith, Karin Hedström","doi":"10.4018/978-1-5225-7847-5.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH007","url":null,"abstract":"Within an organization, it is critical that all employees possess a security awareness and thus play a part in the protection of said organization's information assets. Some employees will have key roles and responsibilities and require specific skills to support them. However, organizations can face challenges in regard to recognizing the required specialized skills as well as where to obtain them. For this reason, whether an organization chooses to hire new staff, developing existing staff, or outsource the activities altogether, it is necessary to know the type and level of expertise required. To this end, this chapter discusses the need for organizations to understand and identify the essential skills related to cybersecurity in order for their employees to develop core competencies in these areas.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Cybersecurity Certifications 网络安全认证的作用
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH012
A. Davis
The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the various audiences to which the certifications are aimed. The role, the perceived and real value, and benefits of certification within the field of information security both from an individual and an organizational perspective are discussed. Finally, some conclusions on certification are presented.
本章着眼于信息安全或网络安全领域的个人认证的新兴领域。个人信息安全认证涵盖了从深度技术到管理的广泛主题。这些证书被用作个人地位和知识的可见标志,用于定义经验和地位,用于职位描述和筛选,并可能定义对个人的期望。本章研究了这些认证是如何产生的,它们涵盖的主题,以及它们是如何整合的,以及这些认证针对的不同受众。从个人和组织的角度讨论了认证在信息安全领域中的作用、感知和实际价值以及益处。最后,给出了一些关于认证的结论。
{"title":"The Role of Cybersecurity Certifications","authors":"A. Davis","doi":"10.4018/978-1-5225-7847-5.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH012","url":null,"abstract":"The chapter looks at the burgeoning field of certification for individuals in the field of information security or cybersecurity. Individual information security certifications cover a wide range of topics from the deeply technical to the managerial. These certifications are used as a visible indication of an individual's status and knowledge, used to define experience and status, used in job descriptions and screening, and may define expectations placed on the individual. This chapter examines how these certifications are produced, the subjects they cover, and how they integrate and the various audiences to which the certifications are aimed. The role, the perceived and real value, and benefits of certification within the field of information security both from an individual and an organizational perspective are discussed. Finally, some conclusions on certification are presented.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Education and Awareness in Tackling Insider Threats 教育和意识在应对内部威胁中的作用
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH003
S. Smyth, K. Curran, Nigel McKelvey
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.
内部威胁是全球组织关注的主要问题。由于组织需要为员工提供访问数据的权限,以使他们能够完成日常任务,因此他们使自己容易受到内部攻击。本章着眼于那些属于可以被称为内部人员的类别,并强调了许多组织采用的外包活动,并定义了术语内部威胁,同时指出了意外威胁与恶意威胁的区别。讨论还考虑了处理内部威胁的各种方法,然后强调了教育和意识在过程中所起的作用,定制意识计划的重要性,以及组织内部威胁的未来。
{"title":"The Role of Education and Awareness in Tackling Insider Threats","authors":"S. Smyth, K. Curran, Nigel McKelvey","doi":"10.4018/978-1-5225-7847-5.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH003","url":null,"abstract":"Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Common Mistakes in Delivering Cybersecurity Awareness 传递网络安全意识的常见错误
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH002
Joshua Crumbaugh
Human error is the cause of over 95% of data breaches and the weakest aspect of cybersecurity in nearly all organizations. These errors guarantee that hackers can easily gain access to almost any network in the world and take complete control of systems, data, and more. This chapter outlines the top mistakes organizations make in security awareness and why most companies are failing to properly prepare their users for cyber-attacks. Each point is accompanied by actionable data derived from real-world training program successes and failures.
人为失误是95%以上数据泄露的原因,也是几乎所有组织中网络安全最薄弱的方面。这些错误保证了黑客可以很容易地访问世界上几乎任何网络,并完全控制系统、数据等。本章概述了组织在安全意识方面犯的主要错误,以及为什么大多数公司未能为用户做好应对网络攻击的准备。每个点都附有来自现实世界培训计划成功和失败的可操作数据。
{"title":"Common Mistakes in Delivering Cybersecurity Awareness","authors":"Joshua Crumbaugh","doi":"10.4018/978-1-5225-7847-5.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH002","url":null,"abstract":"Human error is the cause of over 95% of data breaches and the weakest aspect of cybersecurity in nearly all organizations. These errors guarantee that hackers can easily gain access to almost any network in the world and take complete control of systems, data, and more. This chapter outlines the top mistakes organizations make in security awareness and why most companies are failing to properly prepare their users for cyber-attacks. Each point is accompanied by actionable data derived from real-world training program successes and failures.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114282114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Collaborative Cybersecurity Education Program 协同网络安全教育项目
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH010
T. Tokola, Thomas Schaberreiter, G. Quirchmayr, Ludwig Englbrecht, G. Pernul, S. Katsikas, B. Preneel, Q. Tang
This chapter presents an implementation of a cybersecurity education program. The program aims to address some issues identified in current cybersecurity teaching in higher education on a European level, like the fragmentation of cybersecurity expertise or resource shortage, resulting in few higher education institutions to offer full degree programs. As a result of the Erasmus+ strategic partnership project SecTech, the program tries to overcome those issues by introducing collaborative development to cybersecurity education. SecTech lays the foundations for a collaborative education program, like the definition of a clear content, module and delivery structure, and the appropriate tool support to facilitate collaboration and content reuse. Additional effort is required to achieve long-term success, including the creation of a community that drives the content creation and maintenance, as well as an independent governance structure to steer the project in the long-term. While the project focuses on European collaboration, a global community is envisioned.
本章介绍了网络安全教育计划的实施。该项目旨在解决目前欧洲高等教育网络安全教学中存在的一些问题,比如网络安全专业知识的分散或资源短缺,导致很少有高等教育机构提供完整的学位课程。作为Erasmus+战略合作伙伴项目SecTech的结果,该项目试图通过将协作开发引入网络安全教育来克服这些问题。SecTech为协作教育计划奠定了基础,比如明确内容、模块和交付结构的定义,以及促进协作和内容重用的适当工具支持。实现长期成功需要额外的努力,包括创建驱动内容创建和维护的社区,以及在长期内指导项目的独立治理结构。虽然该项目侧重于欧洲合作,但也设想了一个全球社区。
{"title":"A Collaborative Cybersecurity Education Program","authors":"T. Tokola, Thomas Schaberreiter, G. Quirchmayr, Ludwig Englbrecht, G. Pernul, S. Katsikas, B. Preneel, Q. Tang","doi":"10.4018/978-1-5225-7847-5.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH010","url":null,"abstract":"This chapter presents an implementation of a cybersecurity education program. The program aims to address some issues identified in current cybersecurity teaching in higher education on a European level, like the fragmentation of cybersecurity expertise or resource shortage, resulting in few higher education institutions to offer full degree programs. As a result of the Erasmus+ strategic partnership project SecTech, the program tries to overcome those issues by introducing collaborative development to cybersecurity education. SecTech lays the foundations for a collaborative education program, like the definition of a clear content, module and delivery structure, and the appropriate tool support to facilitate collaboration and content reuse. Additional effort is required to achieve long-term success, including the creation of a community that drives the content creation and maintenance, as well as an independent governance structure to steer the project in the long-term. While the project focuses on European collaboration, a global community is envisioned.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Techniques and Tools for Trainers and Practitioners 培训师和从业人员的技术和工具
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH006
M. Oldham, Abigail McAlpine
If the material is to be delivered effectively, organizations need to understand the human side of cyber security training. In this chapter, the authors draw upon over a decade of experience in creating and adapting training and resources with the help of industry professionals and feedback from clients, which has led to a successful and highly acclaimed approach to cybersecurity education. The resulting discussion considers how to adopt the right approach to cybersecurity training for organizations, with training modules that cater to end users, and which are designed to ensure maximum retention of information by presenting short, humorous, animated scenarios that are relatable for the target audience.
如果要有效地提供这些材料,组织需要了解网络安全培训的人性化方面。在本章中,作者借鉴了十多年来在行业专业人士和客户反馈的帮助下创建和调整培训和资源的经验,这导致了网络安全教育的成功和备受赞誉的方法。由此产生的讨论考虑了如何采用正确的方法为组织进行网络安全培训,培训模块迎合最终用户,并通过呈现与目标受众相关的简短、幽默、动画场景来确保最大限度地保留信息。
{"title":"Techniques and Tools for Trainers and Practitioners","authors":"M. Oldham, Abigail McAlpine","doi":"10.4018/978-1-5225-7847-5.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH006","url":null,"abstract":"If the material is to be delivered effectively, organizations need to understand the human side of cyber security training. In this chapter, the authors draw upon over a decade of experience in creating and adapting training and resources with the help of industry professionals and feedback from clients, which has led to a successful and highly acclaimed approach to cybersecurity education. The resulting discussion considers how to adopt the right approach to cybersecurity training for organizations, with training modules that cater to end users, and which are designed to ensure maximum retention of information by presenting short, humorous, animated scenarios that are relatable for the target audience.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delivering Cybersecurity Education Effectively 有效推行网络安全教育
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7847-5.CH008
Alastair Irons
This chapter draws on current research and best practice into teaching in cybersecurity in higher education. The chapter provides a theoretical and pedagogical foundation for helping tutors make decisions about what topics to include and approaches to teaching and assessing the cybersecurity curriculum. There are of course a range of potential stakeholders in cybersecurity education ranging from government, policy, and law makers to all members of society. However, for the purposes of brevity, this chapter will focus on learners and those creating and delivering cybersecurity education in the higher education (HE) sector.
本章借鉴了当前高等教育网络安全教学的研究和最佳实践。本章提供了一个理论和教学基础,帮助导师决定哪些主题包括和方法来教学和评估网络安全课程。当然,网络安全教育有一系列潜在的利益相关者,从政府、政策制定者、法律制定者到所有社会成员。然而,为了简短起见,本章将重点关注学习者和那些在高等教育(HE)部门创建和提供网络安全教育的人。
{"title":"Delivering Cybersecurity Education Effectively","authors":"Alastair Irons","doi":"10.4018/978-1-5225-7847-5.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5.CH008","url":null,"abstract":"This chapter draws on current research and best practice into teaching in cybersecurity in higher education. The chapter provides a theoretical and pedagogical foundation for helping tutors make decisions about what topics to include and approaches to teaching and assessing the cybersecurity curriculum. There are of course a range of potential stakeholders in cybersecurity education ranging from government, policy, and law makers to all members of society. However, for the purposes of brevity, this chapter will focus on learners and those creating and delivering cybersecurity education in the higher education (HE) sector.","PeriodicalId":336347,"journal":{"name":"Cybersecurity Education for Awareness and Compliance","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133291311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Cybersecurity Education for Awareness and Compliance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1