CYBER SECURITY EDUCATION IN PUBLIC ADMINISTRATION; CASE STUDY ON GAMIFICATION METHODS USED IN EUROPE

Author(s):  
Daria Catalui
Public Voices ◽  
2016 ◽  
Vol 13 (2) ◽  
pp. 143
Author(s):  
Ken Nichols

Star Trek began as a 1960s television series led by a swashbuckling starship Captain, an intellectual off-world first officer, and a multicultural, heart-of-gold crew. In the third of a century since its appearance on our home screens, the series Gene Roddenberry created has become a world-wide phenomenon.Star Trek is also a rich treasure trove of administrative literature: The setting — usually a starship, sometimes a planetary government organization. The characters are clearly delineated, colorful, share common goals, distinguish between their personal and professional roles and concerns, and serve well as archetypes for distinct organizational personalities. And the missions are clear, benevolent, in the public interest, and frequently controversial.As you watch an episode of one of the four Star Trek series, how many of these facets can you observe?That’s public administration, all right, but in a very different wrapper


Public Voices ◽  
2017 ◽  
Vol 2 (3) ◽  
pp. 61
Author(s):  
Nolan J. Argyle ◽  
Lee M. Allen

Pre-service and in-service MPA students share a common desire for hands-on, real world instruction related to their professional career goals, leading to a pedagogic discounting of fiction as an appropriate tool for analyzing and "solving" problems. However, several factors weigh heavily in favor of using science fiction short stories and novellas in the MPA classroom setting. These include the need for interesting case scenarios exploring various administrative issues; leveling the playing field between the two types of students by de-emphasizing the use of "contemporary" cases; access to literature that explores the future shock of increasing organizational complexity; and the desirability of Rorschach type materials that facilitate discussion of. values and administrative truths. The discussion proceeds by tracing the development of the case study technique, its advantages and disadvantages in the classroom, addressing the utility of "fiction" as an educational resource, and showing how the science fiction literature has matured to the point where it can be applied in all of the major sub-fields of public administration. Several outstanding examples are detailed, and a thorough bibliography is provided.


Public Voices ◽  
2016 ◽  
Vol 11 (1) ◽  
pp. 8 ◽  
Author(s):  
Michelle C. Pautz ◽  
Laura Roselle

Perceptions of government and civil servants are shaped by a variety of factors including popular culture. In the public administration literature the significant role that film and other narrative forms have on citizens’ perceptions is duly noted, and there is ample research on politicians and military heroes in film, but a focus on civil servants remains largely elusive. Among the sparse literature centered on civil servants are studies that employ a case study approach or focus on a few films. In contrast, our research employs a large sample of 150 films. These films comprise the top ten box-office grossing films from 1992 through 2006; therefore we examine the films most likely to have been seen by a majority of movie-watching Americans. More than 60 percent of the films in our sample portray government as bad, inefficient, and incompetent. However, the data on more than 300 civil servants yield intriguing findings. Surprising, in light of the negative depiction of government, is the positive depiction of individual civil servants. Half of civil servants were positively portrayed, and only 40 percent were negatively depicted. Americans may view government negatively, but they see in film positive depictions of how individual civil servants can and do make a positive difference.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document