security competency
Recently Published Documents


TOTAL DOCUMENTS

8
(FIVE YEARS 5)

H-INDEX

1
(FIVE YEARS 0)

2022 ◽  
pp. 139-156
Author(s):  
Winfred Yaokumah

There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks emanating from the prevailing and emerging cyber-attacks. This chapter proposes a cyber security competency model that integrates learning theories (cognitive, affective, and psychomotor), learning continuum hierarchy (awareness and training), and cyber security domain knowledge. Employing literature search of scholarly and practitioner works, together with cyber security standards from governmental and non-governmental organizations, the chapter integrates cyber security domain knowledge, learning theories, and learning continuum hierarchy to design a model of cyber security competencies suitable for use in educating individuals and the general workforce. This theoretical-based approach to designing cyber security awareness and training programs will produce skillful individuals and workforce that can mitigate cyber-attacks in the global business environment.


2022 ◽  
pp. 262-279
Author(s):  
Winfred Yaokumah

There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks emanating from the prevailing and emerging cyber-attacks. This chapter proposes a cyber security competency model that integrates learning theories (cognitive, affective, and psychomotor), learning continuum hierarchy (awareness and training), and cyber security domain knowledge. Employing literature search of scholarly and practitioner works, together with cyber security standards from governmental and non-governmental organizations, the chapter integrates cyber security domain knowledge, learning theories, and learning continuum hierarchy to design a model of cyber security competencies suitable for use in educating individuals and the general workforce. This theoretical-based approach to designing cyber security awareness and training programs will produce skillful individuals and workforce that can mitigate cyber-attacks in the global business environment.


Author(s):  
Aroem Naroeni ◽  
Budiman Bela

Rapid progress of technologies does not only exclusively belong to developed countries nowadays but also spread out to developing countries including Indonesia. There are many Indonesian universities and emerging translational medicine centers that had declared themselves as research centers focusing on to bring science from bench to bedside. Since the outbreak of 2007 Avian Influenza, Indonesia had been starting to accumulate more knowledge and experiences related to biosafety and biosecurity. While Indonesian researchers were focusing on biorisk management of high pathogenic bioagents, students were also being exposed gradually to more sophisticated biological hazards through the utilization of synthetic biology and genetic modifications on their own researches. Nurturing the responsible future generation of scientist whom aware of the ethical, biosafety, biosecurity concerns cannot become more important, considering the possibility of dual use research results, which could bring either prosperity or chaos to the universe.


This article describes methodological aspects of developing students’ information security competencies. In the article, the author clarifies the essence of the concept of “information security”, its various aspects, the relationship between the development of information security competency and information-analytical competence, as well as the methodological conditions of information-analytical function. In addition, he substantiates the importance of vitagenic education technology in the development of students’ information-analytical competency, and, on the basis of experimental materials, the correlation between the components of development of students’ information security competency.


Author(s):  
Winfred Yaokumah

There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks emanating from the prevailing and emerging cyber-attacks. This chapter proposes a cyber security competency model that integrates learning theories (cognitive, affective, and psychomotor), learning continuum hierarchy (awareness and training), and cyber security domain knowledge. Employing literature search of scholarly and practitioner works, together with cyber security standards from governmental and non-governmental organizations, the chapter integrates cyber security domain knowledge, learning theories, and learning continuum hierarchy to design a model of cyber security competencies suitable for use in educating individuals and the general workforce. This theoretical-based approach to designing cyber security awareness and training programs will produce skillful individuals and workforce that can mitigate cyber-attacks in the global business environment.


Author(s):  
Mahi Dontamsetti ◽  
Anup Narayanan

This chapter discusses the impact of the human element in information security. We are in the third generation of information security evolution, having evolved from a focus on technical, to process based, to the current focus on the human element. Using case studies, the authors detail how existing technical and process based controls are circumvented, by focusing on weaknesses in human behavior. Factors that affect why individuals behave in a certain way, while making security decisions are discussed. A psychology framework called the conscious competence model is introduced. Using this model, typical individual security behavior is broken down into four quadrants using the individuals’ consciousness and competence. The authors explain how the model can be used by individuals to recognize their security competency level and detail steps for learning more effective behavior. Shortfalls of existing training methods are highlighted and new strategies for increasing information security competence are presented.


Sign in / Sign up

Export Citation Format

Share Document