Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview

H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …

Case-Based Learning for Cybersecurity Leaders: A Systematic Review and Research Agenda

A Anderson, A Ahmad, S Chang - Information & Management, 2024 - Elsevier
Increasingly, large organisations are turning to cybersecurity leaders to protect their
information resources against attack. However, because cybersecurity leadership roles are …

Modern aspects of cyber-security training and continuous adaptation of programmes to trainees

G Hatzivasilis, S Ioannidis, M Smyrlis, G Spanoudakis… - Applied Sciences, 2020 - mdpi.com
Nowadays, more-and-more cyber-security training is emerging as an essential process for
the lifelong personnel education in organizations, especially for those which operate critical …

Embracing the generative ai revolution: Advancing tertiary education in cybersecurity with gpt

R Nowrozy, D Jam - arXiv preprint arXiv:2403.11402, 2024 - arxiv.org
The rapid advancement of generative Artificial Intelligence (AI) technologies, particularly
Generative Pre-trained Transformer (GPT) models such as ChatGPT, has the potential to …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

Securing the human: a review of literature on broadening diversity in cybersecurity education

X Mountrouidou, D Vosen, C Kari, MQ Azhar… - Proceedings of the …, 2019 - dl.acm.org
Recent global demand for cybersecurity professionals is promising, with the US job growth
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …

Personalized learning in a virtual hands-on lab platform for computer science education

Y Deng, D Lu, CJ Chung, D Huang… - 2018 IEEE frontiers in …, 2018 - ieeexplore.ieee.org
This Innovate Practice full paper presents a cloud-based personalized learning lab platform.
Personalized learning is gaining popularity in online computer science education due to its …

Competency models for information security and cybersecurity professionals: analysis of existing work and a new model

D Bendler, M Felderer - ACM Transactions on Computing Education, 2023 - dl.acm.org
Competency models are widely adopted frameworks that are used to improve human
resource functions and education. However, the characteristics of competency models …

RQ labs: A cybersecurity workforce skills development framework

C Daniel, M Mullarkey, M Agrawal - Information Systems Frontiers, 2023 - Springer
This research contributes to the knowledge of how Information Systems (IS) researchers can
iteratively intervene with practitioners to co-create instructional programs with a framework …

Institutional isomorphism in organizational cybersecurity: A text analytics approach

A Jeyaraj, A Zadeh - Journal of Organizational Computing and …, 2020 - Taylor & Francis
This research examines how organizational cybersecurity responses become isomorphic
over time. Drawing on institutional theory, this study theorizes that mimetic pressures …