Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview
H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …
danger of loss or theft. Loss of valuable data leads to negative consequences for both …
Case-Based Learning for Cybersecurity Leaders: A Systematic Review and Research Agenda
Increasingly, large organisations are turning to cybersecurity leaders to protect their
information resources against attack. However, because cybersecurity leadership roles are …
information resources against attack. However, because cybersecurity leadership roles are …
Modern aspects of cyber-security training and continuous adaptation of programmes to trainees
Nowadays, more-and-more cyber-security training is emerging as an essential process for
the lifelong personnel education in organizations, especially for those which operate critical …
the lifelong personnel education in organizations, especially for those which operate critical …
Embracing the generative ai revolution: Advancing tertiary education in cybersecurity with gpt
R Nowrozy, D Jam - arXiv preprint arXiv:2403.11402, 2024 - arxiv.org
The rapid advancement of generative Artificial Intelligence (AI) technologies, particularly
Generative Pre-trained Transformer (GPT) models such as ChatGPT, has the potential to …
Generative Pre-trained Transformer (GPT) models such as ChatGPT, has the potential to …
Cyber-attack scoring model based on the offensive cybersecurity framework
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
Securing the human: a review of literature on broadening diversity in cybersecurity education
Recent global demand for cybersecurity professionals is promising, with the US job growth
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …
rate at 28%, three times the national average [1]. In a global survey, 2,300 security …
Personalized learning in a virtual hands-on lab platform for computer science education
This Innovate Practice full paper presents a cloud-based personalized learning lab platform.
Personalized learning is gaining popularity in online computer science education due to its …
Personalized learning is gaining popularity in online computer science education due to its …
Competency models for information security and cybersecurity professionals: analysis of existing work and a new model
D Bendler, M Felderer - ACM Transactions on Computing Education, 2023 - dl.acm.org
Competency models are widely adopted frameworks that are used to improve human
resource functions and education. However, the characteristics of competency models …
resource functions and education. However, the characteristics of competency models …
RQ labs: A cybersecurity workforce skills development framework
This research contributes to the knowledge of how Information Systems (IS) researchers can
iteratively intervene with practitioners to co-create instructional programs with a framework …
iteratively intervene with practitioners to co-create instructional programs with a framework …
Institutional isomorphism in organizational cybersecurity: A text analytics approach
This research examines how organizational cybersecurity responses become isomorphic
over time. Drawing on institutional theory, this study theorizes that mimetic pressures …
over time. Drawing on institutional theory, this study theorizes that mimetic pressures …