top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others]
ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (171 pages)
Disciplina 004.071
Collana Communications in Computer and Information Science
Soggetto topico Information technology - Study and teaching
Social sciences - Data processing
ISBN 3-030-95003-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464535703316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others]
ICT education : 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, revised selected papers / / edited by Wai Sze Leung [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (171 pages)
Disciplina 004.071
Collana Communications in Computer and Information Science
Soggetto topico Information technology - Study and teaching
Social sciences - Data processing
ISBN 3-030-95003-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910523885403321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Education - Challenges in the Digital Age : 16th IFIP WG 11. 8 World Conference on Information Security Education, WISE 2024, Edinburgh, UK, June 12-14, 2024, Proceedings
Information Security Education - Challenges in the Digital Age : 16th IFIP WG 11. 8 World Conference on Information Security Education, WISE 2024, Edinburgh, UK, June 12-14, 2024, Proceedings
Autore Drevin Lynette
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (213 pages)
Altri autori (Persone) LeungWai Sze
von SolmsSuné
Collana IFIP Advances in Information and Communication Technology Series
ISBN 9783031629181
9783031629174
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cybersecurity Training and Education -- GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness -- 1 Introduction -- 2 Related Work -- 3 A Novel GPT CSAT Framework -- 3.1 Structuring the Training Course -- 3.2 Training the GPT Model -- 3.3 Adaptability in CSAT Programs -- 4 Experimental Methodology -- 5 Experimental Results -- 6 Discussion -- 7 Conclusion -- References -- Using Visual Cues to Enhance Phishing Education for Children -- 1 Introduction -- 2 Literature Review -- 2.1 Children and Online Safety -- 2.2 Examples of Phishing Resources for Children -- 2.3 Gamification and Scenario-Based Learning -- 2.4 Visual Cues -- 3 Prototype Phishing Education Website for Children -- 3.1 Phishing Education -- 3.2 Gamified SBL -- 4 Evaluation -- 4.1 Participant Online Activity -- 4.2 Phishing Identification -- 4.3 Prototype Feedback -- 5 Conclusion -- References -- Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children -- 1 Introduction -- 2 Literature Review -- 2.1 Phishing in the UK Curriculum -- 2.2 Existing Resources -- 3 Methodology -- 4 Action Research Approach -- 4.1 Diagnosing the Current Situation -- 4.2 Action Planning -- 4.3 Action Taking -- 4.4 Evaluation -- 5 Discussion -- 6 Conclusion -- References -- A Framework for Integrating Gamification in Information Security Awareness Programmes for Higher Education Students -- 1 Introduction -- 2 Literature Review -- 2.1 Information Security in Higher Education -- 2.2 Gamification -- 3 Data Collection and Analysis -- 3.1 Theoretical Underpinnings -- 3.2 Methodology -- 3.3 Demographics -- 3.4 Results -- 4 A Conceptual Framework for the Gamification of Security Awareness Programmes -- 5 Conclusion -- 5.1 Contributions -- 5.2 Limitations -- 5.3 Future Work -- References.
Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The Breach and Attack Demonstration (BAD) -- 3.2 Analysis -- 4 Results -- 4.1 Technical Content -- 4.2 Ease of Attack -- 4.3 Relevance of the Material -- 4.4 Protection Measures -- 4.5 Real-Time Visual Reinforcement -- 4.6 Post-Demonstration Survey Results (6+ Months) -- 5 Discussion -- 5.1 Scalability of Security Demonstrations -- 5.2 Guidelines for Designing Breach Attack Demonstrations -- 5.3 Limitations and Future Work -- 6 Conclusion -- References -- Enhancing Awareness -- Empirical Evidence of Fake News Awareness Levels Among Students -- 1 Introduction -- 2 Related Studies -- 3 Methodology -- 3.1 The Survey Instrument -- 3.2 Selection of the News Stories -- 3.3 Pilot Study -- 3.4 The Actual Survey and Participants -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- An In-Depth Analysis of Security and Privacy Concerns in Smart Home IoT Devices Through Expert User Interviews -- 1 Introduction -- 2 Related Literature on Privacy in Smart Home Systems -- 3 Methodology -- 3.1 Participants and Data Processing -- 3.2 Interview Guideline -- 4 Results -- 4.1 Demographics -- 4.2 Smart Home Setup -- 4.3 IoT Device Usage -- 4.4 Identified Constructs and Factors -- 5 Discussion -- 5.1 Recommendations for Implementation -- 5.2 Impact -- 5.3 Limitations -- 5.4 Future Work -- 6 Conclusion -- A Appendix - Interview Guideline -- References -- Safeguarding Children's Digital Privacy: Exploring Design Requirements for Effective Literacy Training for Parents -- 1 Introduction -- 2 Related Work -- 3 Study I: Top-Down -- 3.1 Methodology -- 3.2 Results -- 4 Study II: Bottom-Up -- 4.1 Methodology -- 4.2 Results -- 5 Discussion -- 5.1 Target Group Insights -- 5.2 Teaching Content -- 5.3 Teaching Format.
5.4 Limitations and Future Work -- 6 Conclusion -- References -- Digital Forensics and Investigation -- Digital Detectives: A Serious Point-and-Click Game for Digital Forensics -- 1 Introduction -- 2 Background and Related Work -- 2.1 Serious Game and Point-and-Click Game -- 2.2 Digital Forensics and IoT Forensics -- 2.3 Related Work -- 3 Methodology -- 4 Development of Serious Game -- 4.1 Framework and Environment -- 4.2 Learning Objectives and Game Mechanics -- 4.3 Implementation of Game -- 5 Evaluation -- 6 Discussion and Future Work -- 7 Conclusion -- A Appendix -- References -- Developing Digital Forensics Expertise Competencies Through Courtroom Role-Play -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Foundations and Progressive Learning -- 3.2 Narrative Structure -- 3.3 Courtroom Role-Play -- 4 Developing Digital Forensics Competencies Through Problem-Based Learning -- 4.1 Technology Competencies -- 4.2 Investigative Techniques Competencies -- 4.3 Law Competencies -- 4.4 Enhancing Digital Forensics Education Through PBL -- 5 Evaluation -- 5.1 Individual Journey and Expert Witness Testimony -- 5.2 Question Handling Process -- 5.3 Student Assessment and Engagement -- 5.4 Final Scene and Determination of Guilt -- 5.5 Student Engagement and Feedback -- 5.6 Recommendations for Future Exercises -- 6 Conclusion -- 7 Future Work -- 7.1 Collaboration with the Faculty of Law -- 7.2 Digitisation of Question Suggestions -- 7.3 Assessment and Grading Enhancements -- 7.4 Student Engagement and Feedback -- References -- Cybersecurity Programs and Career Development -- Assessing the Cross-Disciplinary Accessibility of CyBOK -- 1 Introduction -- 2 The Cyber Security Body of Knowledge -- 3 Research Approach -- 4 Survey Findings -- 5 Workshop Findings -- 6 Discussion -- 7 Conclusions -- References.
A Study on Exploring the Challenges of the CyberCorps®: Scholarship for Service Program to Support PhD Level Scholarships -- 1 Introduction -- 2 Research Methodology -- 2.1 Questionnaire -- 2.2 Administration of Focus Group Meetings -- 3 Exploring SFS Under Current Program Rules at the PhD Level -- 3.1 Recruiting -- 3.2 Funding -- 3.3 Programmatic Concerns -- 3.4 Other Factors -- 3.5 Solutions Currently in Place -- 4 Focus Group Recommendations -- 5 Conclusion -- A Questionnaire - SFS Scholarships at PhD Level -- References -- The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity: Professionals' Perspectives -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Career Advising -- 2.2 Professional Development in Cybersecurity -- 2.3 Career Advising in the Era of Generative AI -- 3 Methodology -- 3.1 Survey Method -- 3.2 Demographics -- 4 Analysis -- 4.1 Utilization of Generative AI Chatbots in Professional Development - Current Use and Perceptions on Useful Features -- 4.2 Knowledge on AI Chatbots and Perceptions on Trustworthiness and Value -- 4.3 Participants Concerns and/or Endorsement -- 5 Discussion -- 5.1 The Potential of Generative AI Chatbots as Career Advisors in Cybersecurity -- 5.2 Limitations -- 5.3 Future Directions -- 6 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910865249803321
Drevin Lynette  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui