EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY

被引:0
|
作者
Saravanos, A. [1 ]
Curinga, M. [2 ]
Auchter, K. [1 ]
机构
[1] NYU, New York, NY 10003 USA
[2] Adelphi Univ, Garden City, NY 21402 USA
关键词
Human-computer interaction; cyber security; learning science; graphical authentication;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
引用
收藏
页码:9762 / 9762
页数:1
相关论文
共 50 条
  • [1] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [2] Enabling Practical Experimentation in Cyber-Security Training
    Mao, Jian
    Chua, Zheng Leong
    Liang, Zhenkai
    [J]. 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 516 - 517
  • [3] Adapting Cyber-Security Training to Your Employees
    Pattinson, M.
    Butavicius, M.
    Ciccarello, B.
    Lillie, M.
    Parsons, K.
    Calic, D.
    McCormac, A.
    [J]. PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), 2018, : 67 - 79
  • [4] Exploring Cyber-Security Issues in Vessel Traffic Services
    Kalogeraki, Eleni Maria
    Papastergiou, Spyridon
    Polemi, Nineta
    Douligeris, Christos
    Panayiotopoulos, Themis
    [J]. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2018), PT I, 2018, 11061 : 442 - 451
  • [5] The THREAT-ARREST Cyber-Security Training Platform
    Soultatos, Othonas
    Fysarakis, Konstantinos
    Spanoudakis, George
    Koshutanski, Hristo
    Damiani, Ernesto
    Beckers, Kristian
    Wortmann, Dirk
    Bravos, George
    Ioannidis, Menelaos
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 199 - 214
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [8] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [9] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183