A Holistic View of Cybersecurity Education Requirements

2022 ◽  
pp. 289-307
Author(s):  
Steven M. Furnell ◽  
Ismini Vasileiou

This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the practitioner level (in terms of a skills shortage). The discussion highlights the importance of a holistic approach, covering both personal and workplace use, and addressing the spectrum from end-users through to cybersecurity specialists.

Author(s):  
Steven M. Furnell ◽  
Ismini Vasileiou

This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the practitioner level (in terms of a skills shortage). The discussion highlights the importance of a holistic approach, covering both personal and workplace use, and addressing the spectrum from end-users through to cybersecurity specialists.


2018 ◽  
Vol 27 (3S) ◽  
pp. 1152-1163 ◽  
Author(s):  
Katie Cooke ◽  
Sharon K. Millard

Purpose The aim of this article was to identify what school-aged children who stutter consider to be the most important outcomes from therapy. Method A Delphi approach was employed for the study. Eighteen participants aged 9–13 years completed a survey, generating 90 statements that would constitute successful therapy outcomes. After categorization and reduction, 79 statements were sent to participants in a second survey to seek consensus on their importance. Fifteen participants aged 8–14 years completed this second survey. Statements with the highest median ratings and smallest standard deviations were retained. Results Twenty-one statements were retained after analysis. These reflected hopes for affective and behavioral change in the young person and in other people after therapy. Important outcomes included, but are not limited to, increased fluency, greater independence, increased confidence at school, others knowing how to support the individual, and communication situations feeling easier. Conclusions Participants identified a range of outcomes that were important to achieve as a result of speech and language therapy. The findings suggest a need for a more holistic view of what is meant by successful therapy, incorporating improvements in the ability to communicate and participate in daily situations. The findings suggest that an integrated or holistic approach to intervention would be required to achieve these goals and should include significant others from the child's environment. The important statements identified in this study could be used to inform the content of therapy and to evaluate change over time. Supplemental Material https://doi.org/10.23641/asha.7144205


2017 ◽  
Vol 9 (3/4) ◽  
pp. 347-370 ◽  
Author(s):  
Flaminia Musella ◽  
Roberta Guglielmetti Mugion ◽  
Hendry Raharjo ◽  
Laura Di Pietro

Purpose This paper aims to holistically reconcile internal and external customer satisfaction using probabilistic graphical models. The models are useful not only in the identification of the most sensitive factors for the creation of both internal and external customer satisfaction but also in the generation of improvement scenarios in a probabilistic way. Design/methodology/approach Standard Bayesian networks and object-oriented Bayesian networks are used to build probabilistic graphical models for internal and external customers. For each ward, the model is used to evaluate satisfaction drivers by category, and scenarios for the improvement of overall satisfaction variables are developed. A global model that is based on an object-oriented network is modularly built to provide a holistic view of internal and external satisfaction. The linkage is created by building a global index of internal and external satisfaction based on a linear combination. The model parameters are derived from survey data from an Italian hospital. Findings The results that were achieved with the Bayesian networks are consistent with the results of previous research, and they were obtained by using a partial least squares path modelling tool. The variable ‘Experience’ is the most relevant internal factor for the improvement of overall patient satisfaction. To improve overall employee satisfaction, the variable ‘Product/service results’ is the most important. Finally, for a given target of overall internal and external satisfaction, external satisfaction is more sensitive to improvement than internal satisfaction. Originality/value The novelty of the paper lies in the efforts to link internal and external satisfaction based on a probabilistic expert system that can generate improvement scenarios. From an academic viewpoint, this study moves the service profit chain theory (Heskett et al., 1994) forward by delivering operational guidelines for jointly managing the factors that affect internal and external customer satisfaction in service organizations using a holistic approach.


Author(s):  
Marc Rabaey

This chapter introduces Complex Adaptive Systems Thinking (CAST) into the domain of Intellectual Capital (IC). CAST is based on the theories of Complex Adaptive System (CAS) and Systems Thinking (ST). It argues that the CAST, combined with Intelligence Base offers a potentially more holistic approach to managing the Intellectual Capital of an organization. Furthermore, the authors extend this IC management with additional dimensions proper to a social entity such as an organization. New organizational design methods are needed and the capability approach is such a method that supports IC in virtual and real organizations. The characteristics of Intellectual Capital are discussed in the iterative process of inquiry and the Cynefin Framework, guaranteeing a holistic view on the organization and its environment.


2022 ◽  
pp. 233-261
Author(s):  
Adéle Da Veiga

A security culture can be a competitive advantage when employees uphold strong values for the protection of information and exhibit behavior that is in compliance with policies, thereby introducing minimal incidents and breaches. The security culture in an organization might, though, not be similar among departments, job levels, or even generation groups. It can pose a risk when it is not conducive to the protection of information and when security incidents and breaches occur due to employee error or negligence. This chapter aims to give organizations an overview of the concept of security culture, the factors that could influence it, an approach to assess the security culture, and to prioritize and tailor interventions for high-risk areas. The outcome of the security culture assessment can be used as input to define security awareness, training, and education programs aiding employees to exhibit behavior that is in compliance with security policies.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3267
Author(s):  
Anna Georgiadou ◽  
Spiros Mouzakitis ◽  
Dimitris Askounis

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures. Its innovative approach has been broadly welcomed by both vendors and enterprise customers in the industry. Its usage extends from adversary emulation, red teaming, behavioral analytics development to a defensive gap and SOC (Security Operations Center) maturity assessment. While extensive research has been done on analyzing specific attacks or specific organizational culture and human behavior factors leading to such attacks, a holistic view on the association of both is currently missing. In this paper, we present our research results on associating a comprehensive set of organizational and individual culture factors (as described on our developed cyber-security culture framework) with security vulnerabilities mapped to specific adversary behavior and patterns utilizing the MITRE ATT&CK framework. Thus, exploiting MITRE ATT&CK’s possibilities towards a scientific direction that has not yet been explored: security assessment and defensive design, a step prior to its current application domain. The suggested cyber-security culture framework was originally designed to aim at critical infrastructures and, more specifically, the energy sector. Organizations of these domains exhibit a co-existence and strong interaction of the IT (Information Technology) and OT (Operational Technology) networks. As a result, we emphasize our scientific effort on the hybrid MITRE ATT&CK for Enterprise and ICS (Industrial Control Systems) model as a broader and more holistic approach. The results of our research can be utilized in an extensive set of applications, including the efficient organization of security procedures as well as enhancing security readiness evaluation results by providing more insights into imminent threats and security risks.


2017 ◽  
Vol 24 (3) ◽  
pp. 405-435 ◽  
Author(s):  
Dessislava Dikova ◽  
Arjen van Witteloostuijn ◽  
Simon Parker

Purpose Extant work in international business (IB) involves a partial contingency-theoretic perspective: a holistic view of the impact of bundles of contingencies on an outcome variable is missing. The purpose of this paper is to adopt a contingency approach to study multinational enterprise (MNE) subsidiary performance in the appropriate context of European transition economies at the beginning of the current millennium. Design/methodology/approach Methodologically, the authors introduce abduction as a line of inquiry into IB and management to develop new theoretical insights, and apply the novel empirical general interaction method to estimate bundle effects. In so doing, the authors contribute to the further development of a theoretical and empirical toolkit to revitalize holistic, or configurational, quantitative research in IB and management. Findings The authors find that capability fit is a necessary condition for high MNE subsidiary marketing performance, whilst environment fit is particularly critical for high MNE subsidiary financial performance. Research limitations/implications A key limitation is that this is a cross-section study. Practical implications This study offers insights as to subsidiary fit into Eastern Europe, indicating fitting entry and establishment modes. Originality/value This paper offers a novel holistic approach to IB, both in terms of theoretical and empirical methodology.


2021 ◽  
Vol 115 ◽  
pp. 03014
Author(s):  
Kristina Schreyer ◽  
Arman Dehghani ◽  
Eleonora Fendeková

This paper deals with the performance optimization of occupational safety and health management (OSHM) with the help of the integration of near miss management into existing KPIs of the company. In this context, two independent processes are carried out: risk assessment and near miss management. In this work, the holistic view of these two processes is investigated as an optimization potential OSHM. Based on a literature review, the framework of the qualitative method applied here is established. After definitions and general information concerning OSHM, the processes of risk assessment and near miss management in different organisations (23 international plants for risk assessment and 6 German plants for near miss management) with established processes according to BPM are examined. The chosen approach is combined with the method of the PDCA cycle to relate the results of the investigation to the CIP existing in the OSHM. The result was elaborated in the form of a recommendation for action: optimization of existing processes, integrated hazard and near miss management as a more sustainable solution and proposal for the implementation of a KPI for better control of incidents based on predictive risk assessment.


2021 ◽  
Vol 11 (8) ◽  
pp. 448
Author(s):  
Katie Aylward ◽  
Joakim Dahlman ◽  
Kjetil Nordby ◽  
Monica Lundh

Maritime user interfaces for ships’ bridges are highly dependent on the context in which they are used, and rich maritime context is difficult to recreate in the early stages of user-centered design processes. Operations in Arctic waters where crews are faced with extreme environmental conditions, technology limitations and a lack of accurate navigational information further increase this challenge. There is a lack of research supporting the user-centered design of workplaces for hazardous Arctic operations. To meet this challenge, this paper reports on the process of developing virtual reality-reconstructed operational scenarios to connect stakeholders, end-users, designers, and human factors specialists in a joint process. This paper explores how virtual reality-reconstructed operational scenarios can be used as a tool both for concept development and user testing. Three operational scenarios were developed, implemented in a full mission bridge simulator, recreated in virtual reality (VR), and finally tested on navigators (end-users). Qualitative data were captured throughout the design process and user-testing, resulting in a thematic analysis that identified common themes reflecting the experiences gained throughout this process. In conclusion, we argue that operational scenarios, rendered in immersive media such as VR, may be an important and reusable asset when supporting maritime design processes and in maritime training and education.


Sign in / Sign up

Export Citation Format

Share Document