The Cybersecurity Awareness Training Model (CATRAM)

2022 ◽  
pp. 501-520
Author(s):  
Regner Sabillon

This chapter presents the outcome of one empirical research study that assess the implementation and validation of the cybersecurity awareness training model (CATRAM), designed as a multiple-case study in a Canadian higher education institution. Information security awareness programs have become unsuccessful to change people's attitudes in recognizing, stopping, or reporting cyberthreats within their corporate environment. Therefore, human errors and actions continue to demonstrate that we as humans are the weakest links in cybersecurity. The chapter studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the author compiled recent awareness methodologies, frameworks, and approaches. The cybersecurity awareness training model (CATRAM) has been created to deliver training to different corporate audiences, each of these organizational units with peculiar content and detached objectives. They concluded their study by addressing the necessity of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape.

This chapter presents the outcome of one empirical research study that assess the implementation and validation of the cybersecurity awareness training model (CATRAM), designed as a multiple-case study in a Canadian higher education institution. Information security awareness programs have become unsuccessful to change people's attitudes in recognizing, stopping, or reporting cyberthreats within their corporate environment. Therefore, human errors and actions continue to demonstrate that we as humans are the weakest links in cybersecurity. The chapter studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks, and approaches. The cybersecurity awareness training model (CATRAM) has been created to deliver training to different corporate audiences, each of these organizational units with peculiar content and detached objectives. They concluded their study by addressing the necessity of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape.


Author(s):  
Regner Sabillon ◽  
Jordi Serra-Ruiz ◽  
Victor Cavaller ◽  
Jeimy J. Cano M.

Traditional cybersecurity, security or information security awareness programs have become ineffective to change people's behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape.


2019 ◽  
Vol 21 (3) ◽  
pp. 26-39 ◽  
Author(s):  
Regner Sabillon ◽  
Jordi Serra-Ruiz ◽  
Victor Cavaller ◽  
Jeimy J. Cano M.

Traditional cybersecurity, security or information security awareness programs have become ineffective to change people's behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape.


This chapter presents the outcome of two empirical research studies that assess the implementation and validation of the cybersecurity audit model (CSAM), designed as a multiple-case study in two different Canadian higher education institution. CSAM can be applied for undertaking cybersecurity audits in any organization or nation state in order to evaluate and measure the cybersecurity assurance, maturity, and cyber readiness. The architecture of CSAM is explained in central sections. CSAM has been examined, implemented, and established under three research scenarios: (1) cybersecurity audit of all model domains, (2) cybersecurity audit of numerous domains, and (3) a single cybersecurity domain audit. The chapter concludes by showing how the implementation of the model permits one to report relevant information for future decision making in order to correct cybersecurity weaknesses or to improve cybersecurity domains and controls; thus, the model can be implemented and sufficiently tested at any organization.


2022 ◽  
pp. 77-139
Author(s):  
Regner Sabillon

This chapter presents the outcome of two empirical research studies that assess the implementation and validation of the cybersecurity audit model (CSAM), designed as a multiple-case study in two different Canadian higher education institution. CSAM can be applied for undertaking cybersecurity audits in any organization or nation state in order to evaluate and measure the cybersecurity assurance, maturity, and cyber readiness. The architecture of CSAM is explained in central sections. CSAM has been examined, implemented, and established under three research scenarios: (1) cybersecurity audit of all model domains, (2) cybersecurity audit of numerous domains, and (3) a single cybersecurity domain audit. The chapter concludes by showing how the implementation of the model permits one to report relevant information for future decision making in order to correct cybersecurity weaknesses or to improve cybersecurity domains and controls; thus, the model can be implemented and sufficiently tested at any organization.


2016 ◽  
Vol 17 (1) ◽  
pp. 148-167 ◽  
Author(s):  
Mariachiara Barzotto ◽  
Giancarlo Corò ◽  
Mario Volpe

Purpose – The purpose of this paper is twofold. First, to explore to what extent being located in a territory is value-relevant for a company. Second, to understand if a company is aware of, and how it can sustain, the territorial tangible and intangible assets present in the economic area in which it is located. Design/methodology/approach – The study presents an empirical multiple case-study, investigating ten mid-/large-sized Italian companies in manufacturing sectors. Findings – The results indicate that the sampled manufacturing companies are intertwined with the environment in which they are embedded, both in their home country and in host ones. The domestic territorial capital has provided, and still provides, enterprises with workers endowed with the necessary technical skills that they can have great difficulty in finding in other places. In turn, companies support territorial capital generation through their activities. Research limitations/implications – To increase the generalisability of the results, future research should expand the sample and examine firms based in different countries and sectors. Practical implications – Implications for policy makers: developing effective initiatives to support and guide a sustainable territorial capital growth. Implications for managers and investors: improving managerial and investors’ decisions by disclosing a complete picture of the enterprise, also outside the firm boundaries. Originality/value – The study contributes to intangibles/intellectual capital literature by shedding light on the importance of including territorial capital in a company’s report to improve the definition of the firm’s value. Accounting of the territorial capital would increase the awareness of the socio-economic environment value in which companies are located and its use.


2020 ◽  
Vol 24 (4) ◽  
Author(s):  
Adrie A Koehler ◽  
Zui Cheng ◽  
Holly Fiock ◽  
Shamila Janakiraman ◽  
Huanhuan Wang

Asynchronous discussions are typically considered an essential aspect of online case-based learning. While instructors implement discussions to support a variety of instructional purposes during case-based learning (e.g., facilitate students’ sense making, prompt the consideration of diverse perspectives, debate complex topics), whether students receive the expected benefits is unclear, and little research has considered how students intentionally participate in discussions to support their learning during case-based learning. At the same time, students’ participation in asynchronous online discussions represents a complex endeavor. That is, students must make several decisions regarding how to effectively participate, while simultaneously experiencing several challenges. The purpose of this exploratory multiple-case study was to consider the experiences of six graduate students participating in asynchronous online discussions as a part of a case-based course. By analyzing these experiences, we were able to conceptualize students’ navigation of an asynchronous online discussion as a problem-solving process and consider individual problem-solving approaches. Results indicate that students relied primarily on instructors to determine the purpose of their discussion participation, expressed differing levels of value for participating in discussions, adopted a variety of strategies to meet discussion participation goals, and assessed their participation efforts mainly based on guidelines set by the instructor. We offer suggestions for effectively designing and facilitating asynchronous online discussions and discuss areas needing future research.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ali Ziaee Bigdeli ◽  
Kawaljeet Kapoor ◽  
Andreas Schroeder ◽  
Omid Omidvar

PurposeThis paper explains how servitization disrupts long-established internal and external boundaries of product-focused manufacturers and investigates the root causes of servitization challenges.Design/methodology/approachThe authors draw from the collective experiences of 20 senior executives from ten multinational manufacturers involved in servitization, using a multiple case study approach, and employ a codebook thematic analysis technique.FindingsThe authors develop an integrative framework based on the theoretical notions of power, competency and identity boundaries to offer insights into the root causes of various servitization-related challenges.Research limitations/implicationsAlthough the extant literature discusses servitization challenges, it does not examine the underlying root causes that create them in the first place. This study contributes to the extant research by establishing rational links between organisational boundaries (internal and external) and servitization challenges in the interest of building a coherent and systematically integrated body of theory that can be successfully applied and built upon by future research.Practical implicationsThis study provides a foundation for managers to recognise, anticipate and systematically manage various boundary-related challenges triggered by servitization.Originality/valueIt is one of the first studies to employ the concept of organisational boundary to understand the challenges created by servitization and to account for both internal (between different functions of the same organisation) and external boundaries (between an organisation and its external stakeholders) to establish a holistic understanding of the impacts of servitization on manufacturers.


2018 ◽  
Vol 10 (3) ◽  
pp. 333-343 ◽  
Author(s):  
Alfred Huan Zhi Chan ◽  
Mohd Dahlan Malek ◽  
Ferlis Bahari

Purpose The purpose of this paper is to identify higher authority organizational stressors encountered by higher education deans. Design/methodology/approach This current research employed a qualitative approach utilizing a contextual paradigm with a multiple case study methodology. Findings Out of ten investigated deans in a public higher education institution in Malaysia, nine reported experiences of organizational stressor elements arising from higher authority. Three non-overlapping subthemes were systematically discovered. Practical implications Successful identification of these higher authority organizational stressors has implications for higher education management policies. Policies that reduce or eliminate these stressors may create a positive and progressive environment for deans and the higher education field. Originality/value This study will thus serve to promote a deeper understanding of higher authority organizational stressors encountered by higher education deans.


Crowdsourcing ◽  
2019 ◽  
pp. 1419-1432
Author(s):  
Nina Helander ◽  
Hannu Kärkkäinen ◽  
Jari Jussila

In knowledge society the utilization of social media as a communication channel between people, groups and even companies is increasing. Current innovation and social media research has already shown the potential of crowdsourcing in the business-to-consumer (B2C) markets. The authors argue in this paper, however, that crowdsourcing has a great and yet partly undiscovered potential also in the context of business-to-business (B2B) markets. In order to get the full potential, a more detailed understanding of the logic of value creation in crowdsourcing activities between multiple stakeholders in B2B context is needed. This paper presents an exploratory study that is carried out as an empirical netnography-based multiple case study. The study opens up potential future research avenues by starting the discussion of value creation logic in B2B crowdsourcing. Practical implications are created through cases revealing what kind of value companies have already been able to gain from crowdsourcing in B2B context.


Sign in / Sign up

Export Citation Format

Share Document