Brain-compatible, web-based information security education: a statistical study

2014 ◽  
Vol 22 (4) ◽  
pp. 371-381 ◽  
Author(s):  
Rayne Reid ◽  
Johan van Niekerk

Purpose – This paper aims to demonstrate that learners prefer brain-compatible cyber security educational material, over traditional presentation methods. Design/methodology/approach – A prototype brain-compatible cyber security educational system was evaluated using a survey as a research instrument. Findings – Presenting cyber security material in a brain-compatible manner is an effective way in which to stimulate the learners’ interest, engages them in the learning experience and motivates them to learn. Originality/value – As far as could be determined, no previous studies showed the relevance of brain-compatible pedagogical techniques to cyber security education.

2014 ◽  
Vol 22 (2) ◽  
pp. 130-133 ◽  
Author(s):  
Eugene Kaspersky ◽  
Steven Furnell

Purpose – The purpose of this paper is to highlight the importance of cyber security education as a means of enabling skilled professionals and ensuring adequate awareness amongst end users. Design/methodology/approach – The discussion examines the contribution made by the Kaspersky Academy student conference series, and then proceeds to consider some related questions posed to Eugene Kaspersky as the founder of the programme. Findings – The question and answer segment of the discussion identifies the ways in which academic qualifications and professional certifications can align to support a rounded security education for those aiming to become practitioners. Originality/value – The discussion provides a clear insight into the importance of security education and how it is being actively supported by one of the leading companies in the industry.


2018 ◽  
Vol 26 (3) ◽  
pp. 365-378
Author(s):  
Nicholas Micallef ◽  
Nalin Asanka Gamagedara Arachchilage

Purpose Security questions are one of the techniques used to recover forgotten passwords. However, security questions have both security and memorability limitations. To limit their security vulnerabilities, stronger answers need to be used. As serious games can motivate users to change their security behaviour, the purpose of this paper is to explore the features and functionalities that users would require in a serious game that educates them to provide stronger answers to security questions. Design/methodology/approach A lab study was conducted to collect users’ feedback on the desired game features and functionalities. In Stage 1, participants selected security questions/answers. In Stage 2, participants played a game and evaluated the usability and the provided features. Findings The main findings reveal that most participants found the current features and functionalities to be desirable; socially oriented functionalities (e.g. getting help from other players) did not seem desirable because users feared that their acquaintances could gain access to their security questions. Originality/value This research recommends that designers of serious games for security education should: use intrinsic rewards to motivate users to have a better learning experience; provide easier challenges during the training period and provide harder challenges only when the game determines that the users learned to play the game; and design their games for mobile devices because even users who usually do not play games would play a security education game on a mobile device.


Author(s):  
Henry Larkin

Purpose – The purpose of this paper is to investigate the feasibility of creating a declarative user interface language suitable for rapid prototyping of mobile and Web apps. Moreover, this paper presents a new framework for creating responsive user interfaces using JavaScript. Design/methodology/approach – Very little existing research has been done in JavaScript-specific declarative user interface (UI) languages for mobile Web apps. This paper introduces a new framework, along with several case studies that create modern responsive designs programmatically. Findings – The fully implemented prototype verifies the feasibility of a JavaScript-based declarative user interface library. This paper demonstrates that existing solutions are unwieldy and cumbersome to dynamically create and adjust nodes within a visual syntax of program code. Originality/value – This paper presents the Guix.js platform, a declarative UI library for rapid development of Web-based mobile interfaces in JavaScript.


2015 ◽  
Vol 22 (4) ◽  
pp. 530-544 ◽  
Author(s):  
Arjen van Witteloostuijn

Purpose – The purpose of this paper is to argue that the time is ripe to establish a powerful tradition in Experimental International Business (IB). Probably due to what the Arjen van Witteloostuijn refers to as the external validity myth, experimental laboratory designs are underutilized in IB, which implies that the internal validity miracle of randomized experimentation goes largely unnoticed in this domain of the broader management discipline. Design/methodology/approach – In the following pages, the author explains why the author believes this implies a missed opportunity, providing arguments and examples along the way. Findings – Although an Experimental Management tradition has never really gained momentum, to the author, the lab experimental design has a very bright future in IB (and management at large). To facilitate the development of an Experimental IB tradition, initiating web-based tools would be highly instrumental. This will not only boost further progress in IB research, but will also increase the effectiveness and playfulness of IB teaching. Originality/value – Given the high potential of an Experimental IB, the Cross-Cultural and Strategic Management journal will offer a platform for such exciting and intriguing laboratory work, cumulatively contributing to the establishment of an Experimental IB tradition.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hiroaki Sano ◽  
Yohei Chiba ◽  
Sachiko Maeda ◽  
Chiharu Ikeda ◽  
Nobuyuki Handa ◽  
...  

Purpose This study examines the websites of central government ministries, prefectures and municipalities to obtain a comprehensive bird’s-eye view of how they are preparing for natural disasters in the context of the novel coronavirus (COVID-19) outbreak. Design/methodology/approach This study examines the websites of central government ministries, prefectures and municipalities in Japan to survey the actual status of information dissemination on “evacuation and sheltering” in the context of COVID-19. Findings This study found that the central government issued many notices, notifications and administrative communications to prefectures, cities with public health centers and special wards, which were mainly related to opening, securing and operating evacuation centers and improving the environment. It was found that most prefectures disseminated information on both survival and living evacuation and did so from June onward, when the flood season was approaching. Among the municipalities, there were differences in information dissemination tendencies by prefecture, and it became clear that smaller municipalities were especially incapable of fully disseminating information via the Web. Research limitations/implications The data from the prefectures and municipalities surveyed in this study were collected from websites and do not necessarily represent the actual response to disaster-related evacuation in the context of COVID-19 in those areas. To clarify this evacuation, more detailed surveys are needed. Originality/value This study is unique because no research has been conducted on the response of Japanese administrative agencies to disaster-related evacuation in the context of COVID-19; the actual situation was analyzed in this study by examining central government ministries, prefectures and municipalities as administrative agencies and comparing their responses.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Peter Buell Hirsch

Purpose The purpose of the viewpoint is to examine the various ways in which the pandemic has exposed structural vulnerabilities in global business infrastructures that have long existed and been long ignored. It urges business leaders not to return to a “new normal” but make fundamental changes to ensure that their businesses are truly resilient and can withstand future threats more effectively. Design/methodology/approach The viewpoint looks at the various kinds of vulnerability to which businesses are exposed – such as supply chain, human capital, cyber security and climate change – and proposes ways to ensure that businesses, as well as shareholders and government entities work together to build true resilience. Findings At its core, the viewpoint exposes the various ways in which businesses have turned a blind eye to vulnerabilities that have always lurked just below the surface and suggests. The argument is that to secure the long-term future of our global business system, we can no longer remain oblivious to fundamental weaknesses in our infrastructures. Research limitations/implications The viewpoint looks selectively at the available data and is, therefore, by definition, subjective and non-comprehensive. Practical implications If businesses and shareholders truly take the recommendations of this viewpoint to heart, we can build a more resilient future through long-term investments in risk management infrastructures of all kinds that will secure a more prosperous and stable future. Social implications Developing a more resilient and stable global business infrastructure will help reduce the business volatility deriving from last minute responses to predictable threats. This will, in turn, help provide more stable, fulfilling employment, especially in developing countries that will act as a fly wheel for the secure development of human potential around the world. Originality/value While there has been much speculation of what the “new business normal” will look like once the pandemic has been conquered, this is, the author believes, the first piece to look concretely on how we can not only “build back better” but build back more soundly for the long term.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Serkan Yiğit ◽  
Nilüfer Şahin Perçin

Purpose The purpose of this study is to examine and understand the experiences of tourists in the Turkish coffee houses in Istanbul, Turkey. Design/methodology/approach In this study, a qualitative case study method was used to analyze tourists’ comments with user-generated content technique by analyzing tourists’ comments. The data used in the study was collected through TripAdvisor, which is considered one of the most famous websites with tourist reviews and comments, between 20 May and 10 June 2020 from tourists’ reviews (n:219). Findings The findings show that Turkish coffee house experiences are heterogeneous based on the dimensions of coffee characteristics, place, satisfaction, recommendation and revisit intention, value/price and value-added experience. Moreover, value-added experience includes some sub-themes such as a memorable experience, authentic experience and culture learning experience. Originality/value There are some studies on Turkish coffee and Turkish coffee culture in the literature, but there have been no empirical studies investigating the Turkish coffee house experiences of tourists. For this reason, this study aims to examine and understand the experiences of tourists in Turkish coffee houses. Therefore, it is believed that this study will fill the current gap in the literature on tourists’ experiences of Turkish coffee houses.


Author(s):  
Noor Afiza Mat Razali ◽  
Khairul Khalil Ishak ◽  
Muhamad Aliff Irfan Muhamad Fadzli ◽  
Nurjannatul Jannah Aqilah M. Saad

2017 ◽  
Vol 34 (8) ◽  
pp. 8-19
Author(s):  
Stacy Brody

Purpose The purpose of this paper is to profile various types of Web-based tools to facilitate research collaboration within and across institutions. Design/methodology/approach Various Web-based tools were tested by the author. Additionally, tutorial videos and guides were reviewed. Findings There are various free and low-cost tools available to assist in the collaborative research process, and librarians are well-positioned to facilitate their usage. Practical implications Librarians and researchers will learn about various types of tools available at free or at low cost to fulfill needs of the collaborative research process. Social implications As the tools highlighted are either free or of low cost, they are also valuable to start-ups and can be recommended for entrepreneurs. Originality/value As the realm of Web-based collaborative tools continues to evolve, the options must be continually revisited and reviewed for currency.


2020 ◽  
Vol 14 (3/4) ◽  
pp. 209-218 ◽  
Author(s):  
Jennifer Van Allen ◽  
Stacy Katz

Purpose Open Educational Resources (OER) are learning materials openly licensed so that others may retain, reuse, revise, remix or redistribute (the 5Rs) these materials. This paper aims to raise awareness of OER by providing a rationale for using these learning materials and a strategy for educators to get started with OER during the collective crisis and beyond. Design/methodology/approach Using a broad research base and anecdotes from personal experience, the authors make the case that OER improves student access to learning materials and improves the learning experience in both PK-12 and higher education contexts. Findings The authors define and describe the benefits of OER to provide practical suggestions educators can implement during the pandemic and beyond. Practical implications To support educators in finding and using OER, this paper highlights repositories that include a breadth of various learning materials across subject areas and educational contexts. The authors provide specific suggestions for finding, personalizing and contextualizing OER. Originality/value This work not only provides an overview of OER with particular considerations for educators during the COVID-19 pandemic but also makes the case that OER should be integrated into classrooms beyond the pandemic.


Sign in / Sign up

Export Citation Format

Share Document