Wargaming in Cyber Security Education and Awareness Training

Author(s):  
Andreas HAGGMAN

This paper introduces readers to core concepts around cyber wargaming. Wargames can be powerful learning tools, but few wargames exist to teach players about cyber security. By way of highlighting possibilities in this space, the author has developed an original educational tabletop wargame based on the UK National Cyber Security Strategy and deployed the game to a variety of organisations to determine its pedagogic efficacy. Overall, it is found that the game was effective in generating high-engagement participation and clear learning opportunities. Furthermore, there are design lessons to be learned from existing games for those seeking to use wargames for cyber security training and education.

Author(s):  
Margo Pickworth

Mobile devices are prolific and young people have embraced this technology in all facets of their lives. Using a small number of iTouch and iPad devices in a school library has provided students rich learning opportunities which have enhanced cognitive, personal and interpersonal skills. By harnessing their power and motivation, mobile devices can become powerful learning tools. Integrating QR codes, Student response apps, Thinking and Presentation tools have been used to develop cognitive skills. This article will explain, justify and provide illustrations of practice of how these devices have been used and demonstrate their value in making connections in the school library.


2021 ◽  
pp. 095042222110344
Author(s):  
Oswald Jones

Academic engagement with small business and entrepreneurship was facilitated by the availability of European Union (EU) funding, which also stimulated the emergence of a small business and entrepreneurship (SBE) ‘community of practice’. Gradually, the SBE community developed into a ‘landscape of practice’ as small business research moved towards maturity. Furthermore, the SBE landscape of practice has coalesced around three core concepts: entrepreneurial learning, social networks and social capital. EU funding was the catalyst for many SBE academics in the UK to engage with practitioners involved with starting and managing their own businesses. The UK’s exit from the EU will inevitably mean that universities will no longer have access to EU Structural Funds. This has major implications for the UK SBE community’s engagement with practice as well as for entrepreneurs and business owners who have benefitted from a range of programmes designed to improve the performance of smaller firms.


2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


Author(s):  
Ion PARASCHIVA

The field of cyber security is evolving at an alert pace and requires constantly updated strategies, and from the IT specialists, extensive knowledge and experience. In addition to the technical knowledge regarding cyber security, IT specialists of the Romanian Police need to understand very well the nature of the activity carried out. It should be made aware that there is no valid general success recipe and that the development of security policies should start from analyzing the particularities of human resources. Once their activity is understood, a dedicated security strategy can be outlined, ensuring a high degree of security for the organization and the information held by it.


Sign in / Sign up

Export Citation Format

Share Document