scholarly journals Security Awareness Programs

2012 ◽  
Vol 16 (4) ◽  
pp. 165-168 ◽  
Author(s):  
Yu Andy Wu ◽  
Carl S. Guynes ◽  
John Windsor

A critical component of security design is security awareness programs. Implemented effectively, security awareness programs enable organizational members to understand the organizations security posture, their responsibilities, and courses of action in the face of security incidents (Purser, 2004). Awareness training programs should be designed as an initiative to foster organizational learning. In addition to the widely used training methods built with traditional or computer-based media, organizational learning tools, such as cognitive maps, are recommended in training to build security awareness as one type of distributed cognition.

2021 ◽  
Vol 11 (6) ◽  
pp. 7944-7949
Author(s):  
A. Darem

Phishing attacks are increasingly exploited by cybercriminals, they become more sophisticated and evade detection even by advanced technical countermeasures. With cybercriminals resorting to more sophisticated phishing techniques, strategies, and different channels such as social networks, phishing is becoming a hard problem to solve. Therefore, the main objective for any anti-phishing solution is to minimize phishing success and its consequences through complementary means to advanced technical countermeasures. Specifically, phishing threats cannot be controlled by technical controls alone, thus it is imperative to complement cybersecurity programs with cybersecurity awareness programs to successfully fight against phishing attacks. This paper provides a review of the delivery methods of cybersecurity training programs used to enhance personnel security awareness and behavior in terms of phishing threats. Although there are a wide variety of educational intervention methods against phishing, the differences between the cybersecurity awareness delivery methods are not always clear. To this end, we present a review of the most common methods of workforce cybersecurity training methods in order for them to be able to protect themselves from phishing threats.


Author(s):  
Agata McCormac ◽  
Dragana Calic ◽  
Marcus Butavicius ◽  
Kathryn Parsons ◽  
Tara Zwaans ◽  
...  

The Human Aspects of Information Security Questionnaire (HAIS-Q) is designed to measure Information Security Awareness. More specifically, the tool measures an individual’s knowledge, attitude, and self-reported behaviour relating to information security in the workplace. This paper reports on the reliability of the HAIS-Q, including test-retest reliability and internal consistency. The paper also assesses the reliability of three preliminary over-claiming items, designed specifically to complement the HAIS-Q, and identify those individuals who provide socially desirable responses. A total of 197 working Australians completed two iterations of the HAIS-Q and the over-claiming items, approximately 4 weeks apart. Results of the analysis showed that the HAIS-Q was externally reliable and internally consistent. Therefore, the HAIS-Q can be used to reliably measure information security awareness. Reliability testing on the preliminary over-claiming items was not as robust and further development is required and recommended. The implications of these findings mean that organisations can confidently use the HAIS-Q to not only measure the current state of employee information security awareness within their organisation, but they can also measure the effectiveness and impacts of training interventions, information security awareness programs and campaigns. The influence of cultural changes and the effect of security incidents can also be assessed. 


2021 ◽  
pp. 1-11
Author(s):  
Suphawimon Phawinee ◽  
Jing-Fang Cai ◽  
Zhe-Yu Guo ◽  
Hao-Ze Zheng ◽  
Guan-Chen Chen

Internet of Things is considerably increasing the levels of convenience at homes. The smart door lock is an entry product for smart homes. This work used Raspberry Pi, because of its low cost, as the main control board to apply face recognition technology to a door lock. The installation of the control sensing module with the GPIO expansion function of Raspberry Pi also improved the antitheft mechanism of the door lock. For ease of use, a mobile application (hereafter, app) was developed for users to upload their face images for processing. The app sends the images to Firebase and then the program downloads the images and captures the face as a training set. The face detection system was designed on the basis of machine learning and equipped with a Haar built-in OpenCV graphics recognition program. The system used four training methods: convolutional neural network, VGG-16, VGG-19, and ResNet50. After the training process, the program could recognize the user’s face to open the door lock. A prototype was constructed that could control the door lock and the antitheft system and stream real-time images from the camera to the app.


2017 ◽  
Vol 2 (1) ◽  
pp. 155-167
Author(s):  
Badrudin Badrudin

This study aimed to analyze the management of ICT-based Arabic learning. This study was designed to find the management of ICT-based Arabic learning in MA Daarul Uluum Majalengka. This study proposed that the integration of various fields of studies with ICT, including Arabic language learning, is undeniably vital to be enhanced in this digital era. However, the constraints experienced by some institutions, especially the educators, have not had a clear format of the use of ICT in the integration effort of the both disciplines. This study applied a qualitative research approach. The research method was descriptive method. The data were collected by conducting observation, interview, and documentation. The data were analyzed using the techniques qualitative analysis. The results showed that the design of ICT-based Arabic learning model can be developed at MA Daarul Uluum Majalengka a communicative computer-based Arabic learning model. The materials and other learning tools are designed using a computer program. Through this kind of learning models, a teacher served as learning motivator and facilitator elaborating the materials that need clarification for the learners.


Author(s):  
Andri Akbar ◽  
I Gusti Putu Octavio ◽  
Rida Aini Rahmawati

The Covid-19 pandemic has an impact in all fields, namely in terms of health, social, economic, and food. Reduced income or even job loss to cause a decrease in the ability to meet basic needs, namely family food needs. Corporate Social Responsibility (CSR) of Pertamina Corporation Integrated Terminal Jakarta initiated collaboration between community groups and various stakeholders through the integration of the budikdamber system and the development of processed product innovations done in Rawa Badak Selatan Village, Koja District, North Jakarta as the Area 1 Company's Ring. The development of processed innovation products is carried out together with the Bunda Koja group by carrying out all contain catfish product (ACE) activities. ACE's budikdamber activities are empowered by cultivating fish and vegetables in buckets carried out in several yards of residents of the Rawa Badak Selatan Village. This activity is expected to contribute to the community’s resilience in the face of pandemics by increasing knowledge and skills in developing mental systems and their processed products. The implementation of activities is carried out by training methods and the application of mentoring. The community generally feels helped because the process of making processed and ACE budikdamber is empowered to facilitate for the community to get nutritious food. This activity also has an impact on improving nutrition and socioeconomics of toddler parents, through training in nutritious catfish processed products, toddler mothers can learn to understand the importance of nutritious food for toddlers.


2020 ◽  
Vol 1 (1) ◽  
pp. 56-63
Author(s):  
Emerson Raja Joseph ◽  
Md Jakir Hoseen ◽  
Fazly Salleh ◽  
Lim Way Soong

With the advent of technology there are plenty of blended learning tools available for us to use in teaching and training activity. Selecting appropriate tools for a particular category of students and the nature of the subject being taught is important to achieve better academic results. Hence, the objective of this research is to assess effectiveness of various blended learning tools and to find the appropriate tool for teaching a computer -based campus in Malaysia. This subject was delivered using four selected blended learning digital tools; ED puzzle virtual classroom videos, Home works on MMLS, MMLS online Quiz and MMLS discussion board, at the beginning of Trimester 2, 2018/2019. They were asked in the middle of the trimester to rate the usefulness of the four selected blended learning digital tools in a 5-point scale using an online survey. The analysis feedback shows that D puzzle virtual the trimester. The effectivenes when the achievements of the students in terms of their academic performance were compared with previous year. It clearly shows that the academic performance of the students of year 2019 is better than of students towards student centred learning.


Sign in / Sign up

Export Citation Format

Share Document