ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (171 pages) |
Disciplina | 004.071 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Information technology - Study and teaching
Social sciences - Data processing |
ISBN | 3-030-95003-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464535703316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (171 pages) |
Disciplina | 004.071 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Information technology - Study and teaching
Social sciences - Data processing |
ISBN | 3-030-95003-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910523885403321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security Education - Challenges in the Digital Age : 16th IFIP WG 11. 8 World Conference on Information Security Education, WISE 2024, Edinburgh, UK, June 12-14, 2024, Proceedings |
Autore | Drevin Lynette |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (213 pages) |
Altri autori (Persone) |
LeungWai Sze
von SolmsSuné |
Collana | IFIP Advances in Information and Communication Technology Series |
ISBN |
9783031629181
9783031629174 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Cybersecurity Training and Education -- GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness -- 1 Introduction -- 2 Related Work -- 3 A Novel GPT CSAT Framework -- 3.1 Structuring the Training Course -- 3.2 Training the GPT Model -- 3.3 Adaptability in CSAT Programs -- 4 Experimental Methodology -- 5 Experimental Results -- 6 Discussion -- 7 Conclusion -- References -- Using Visual Cues to Enhance Phishing Education for Children -- 1 Introduction -- 2 Literature Review -- 2.1 Children and Online Safety -- 2.2 Examples of Phishing Resources for Children -- 2.3 Gamification and Scenario-Based Learning -- 2.4 Visual Cues -- 3 Prototype Phishing Education Website for Children -- 3.1 Phishing Education -- 3.2 Gamified SBL -- 4 Evaluation -- 4.1 Participant Online Activity -- 4.2 Phishing Identification -- 4.3 Prototype Feedback -- 5 Conclusion -- References -- Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children -- 1 Introduction -- 2 Literature Review -- 2.1 Phishing in the UK Curriculum -- 2.2 Existing Resources -- 3 Methodology -- 4 Action Research Approach -- 4.1 Diagnosing the Current Situation -- 4.2 Action Planning -- 4.3 Action Taking -- 4.4 Evaluation -- 5 Discussion -- 6 Conclusion -- References -- A Framework for Integrating Gamification in Information Security Awareness Programmes for Higher Education Students -- 1 Introduction -- 2 Literature Review -- 2.1 Information Security in Higher Education -- 2.2 Gamification -- 3 Data Collection and Analysis -- 3.1 Theoretical Underpinnings -- 3.2 Methodology -- 3.3 Demographics -- 3.4 Results -- 4 A Conceptual Framework for the Gamification of Security Awareness Programmes -- 5 Conclusion -- 5.1 Contributions -- 5.2 Limitations -- 5.3 Future Work -- References.
Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The Breach and Attack Demonstration (BAD) -- 3.2 Analysis -- 4 Results -- 4.1 Technical Content -- 4.2 Ease of Attack -- 4.3 Relevance of the Material -- 4.4 Protection Measures -- 4.5 Real-Time Visual Reinforcement -- 4.6 Post-Demonstration Survey Results (6+ Months) -- 5 Discussion -- 5.1 Scalability of Security Demonstrations -- 5.2 Guidelines for Designing Breach Attack Demonstrations -- 5.3 Limitations and Future Work -- 6 Conclusion -- References -- Enhancing Awareness -- Empirical Evidence of Fake News Awareness Levels Among Students -- 1 Introduction -- 2 Related Studies -- 3 Methodology -- 3.1 The Survey Instrument -- 3.2 Selection of the News Stories -- 3.3 Pilot Study -- 3.4 The Actual Survey and Participants -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- An In-Depth Analysis of Security and Privacy Concerns in Smart Home IoT Devices Through Expert User Interviews -- 1 Introduction -- 2 Related Literature on Privacy in Smart Home Systems -- 3 Methodology -- 3.1 Participants and Data Processing -- 3.2 Interview Guideline -- 4 Results -- 4.1 Demographics -- 4.2 Smart Home Setup -- 4.3 IoT Device Usage -- 4.4 Identified Constructs and Factors -- 5 Discussion -- 5.1 Recommendations for Implementation -- 5.2 Impact -- 5.3 Limitations -- 5.4 Future Work -- 6 Conclusion -- A Appendix - Interview Guideline -- References -- Safeguarding Children's Digital Privacy: Exploring Design Requirements for Effective Literacy Training for Parents -- 1 Introduction -- 2 Related Work -- 3 Study I: Top-Down -- 3.1 Methodology -- 3.2 Results -- 4 Study II: Bottom-Up -- 4.1 Methodology -- 4.2 Results -- 5 Discussion -- 5.1 Target Group Insights -- 5.2 Teaching Content -- 5.3 Teaching Format. 5.4 Limitations and Future Work -- 6 Conclusion -- References -- Digital Forensics and Investigation -- Digital Detectives: A Serious Point-and-Click Game for Digital Forensics -- 1 Introduction -- 2 Background and Related Work -- 2.1 Serious Game and Point-and-Click Game -- 2.2 Digital Forensics and IoT Forensics -- 2.3 Related Work -- 3 Methodology -- 4 Development of Serious Game -- 4.1 Framework and Environment -- 4.2 Learning Objectives and Game Mechanics -- 4.3 Implementation of Game -- 5 Evaluation -- 6 Discussion and Future Work -- 7 Conclusion -- A Appendix -- References -- Developing Digital Forensics Expertise Competencies Through Courtroom Role-Play -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Foundations and Progressive Learning -- 3.2 Narrative Structure -- 3.3 Courtroom Role-Play -- 4 Developing Digital Forensics Competencies Through Problem-Based Learning -- 4.1 Technology Competencies -- 4.2 Investigative Techniques Competencies -- 4.3 Law Competencies -- 4.4 Enhancing Digital Forensics Education Through PBL -- 5 Evaluation -- 5.1 Individual Journey and Expert Witness Testimony -- 5.2 Question Handling Process -- 5.3 Student Assessment and Engagement -- 5.4 Final Scene and Determination of Guilt -- 5.5 Student Engagement and Feedback -- 5.6 Recommendations for Future Exercises -- 6 Conclusion -- 7 Future Work -- 7.1 Collaboration with the Faculty of Law -- 7.2 Digitisation of Question Suggestions -- 7.3 Assessment and Grading Enhancements -- 7.4 Student Engagement and Feedback -- References -- Cybersecurity Programs and Career Development -- Assessing the Cross-Disciplinary Accessibility of CyBOK -- 1 Introduction -- 2 The Cyber Security Body of Knowledge -- 3 Research Approach -- 4 Survey Findings -- 5 Workshop Findings -- 6 Discussion -- 7 Conclusions -- References. A Study on Exploring the Challenges of the CyberCorps®: Scholarship for Service Program to Support PhD Level Scholarships -- 1 Introduction -- 2 Research Methodology -- 2.1 Questionnaire -- 2.2 Administration of Focus Group Meetings -- 3 Exploring SFS Under Current Program Rules at the PhD Level -- 3.1 Recruiting -- 3.2 Funding -- 3.3 Programmatic Concerns -- 3.4 Other Factors -- 3.5 Solutions Currently in Place -- 4 Focus Group Recommendations -- 5 Conclusion -- A Questionnaire - SFS Scholarships at PhD Level -- References -- The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals' Perspectives -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Career Advising -- 2.2 Professional Development in Cybersecurity -- 2.3 Career Advising in the Era of Generative AI -- 3 Methodology -- 3.1 Survey Method -- 3.2 Demographics -- 4 Analysis -- 4.1 Utilization of Generative AI Chatbots in Professional Development - Current Use and Perceptions on Useful Features -- 4.2 Knowledge on AI Chatbots and Perceptions on Trustworthiness and Value -- 4.3 Participants Concerns and/or Endorsement -- 5 Discussion -- 5.1 The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity -- 5.2 Limitations -- 5.3 Future Directions -- 6 Conclusions -- References -- Author Index. |
Record Nr. | UNINA-9910865249803321 |
Drevin Lynette | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|