Cited By
View all- Prümmer Jvan Steen Tvan den Berg B(2024)A systematic review of current cybersecurity training methodsComputers and Security10.1016/j.cose.2023.103585136:COnline publication date: 1-Feb-2024
User-initiated security breaches are common and can be very costly to organizations. Information security training can be used as an effective tool to improve users' secure behavior and thus alleviate security breaches. Via the lens of learning, working ...
this paper discusses and builds the information planning program in the process of training management using CSF method of information planning, in the basic principles of management science. It proposes the software planning idea for the feasible ...
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive. ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in