PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Decision support methods in cybersecurity education

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Even the best technology will be ineffective if not used appropriately, therefore education and training about cybersecurity principles and programs are essential components of any cybersecurity strategy. This article presents selected models of the decision support theory from the point of view of cybersecurity education. The analysis of scientific literature and the available research results serve as a base to characterize approaches to raise the awareness of decision-makers about potential cyber threats and the development of appropriate attitudes and the conscious use of information systems and digital resources. The main part of the article is devoted to the issue of the use of teaching methods to increase the involvement of learners. It also describes examples of selected models of the game theory used in IT security education, including examples of simulation games dedicated to decision-making in the domain of IT security.
Rocznik
Strony
245--256
Opis fizyczny
Bibliogr. 11 poz., rys.
Twórcy
  • Institute of IT in Management, Faculty of Economics and Management, University of Szczecin, Mickiewicza 64, 71–101 Szczecin, Poland
autor
  • Faculty of Economy and Information Technology, West Pomeranian Business School in Szczecin, Żołnierska 53, 71–210 Szczecin, Poland
Bibliografia
  • [1] EU Cybersecurity Dashboard A Path to a Secure European Cyberspace [online] http://cybersecurity.bsa.org/assets/PDFs/studyeucybersecurityen.pdf
  • [2] Taylor C, Krings A and Alves-Foss J Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening [online] https://www.researchgate.net/profile/JimAlves-Foss/publication/228861020 Risk_analysis_and_probabilistic_survivability_assessment_RAPSA_An_assessment_approach_for_power_substation_hardening/links/0046352127e8cc3e24000000.pdf, Computer Science Department University of Idaho
  • [3] Sommestad T, Ekstedt M and Johnson P 2009 System Sciences,HICSS ’09
  • [4] El Fray I A 2012 Lecture Notes in Computer Science7564
  • [5] Delaney D G, Welch V and Starzynski C A 2015 Annual Report and Strategic Plan (2015–2020) [online] http://hdl.handle.net/2022/20412, Center for Applied Cybersecurity Research
  • [6] Roberson E P 2015 Adequate Cybersecurity: Flexibility and Balance for a Proposed Standard of Care and Liability for Government Contractors, 25 Fed. Cir. B. J. 641 (2015–2016)
  • [7] Jajodia S, Shakarian P, Subrahmanian VS, Swarup V and Wang C (Eds.) 2015 CyberWarfare: Building the Scientific Foundation, Springer, USA
  • [8] Kiekintveld Ch, Lisy V and Pibil P Gametheoretic Foundations for the Strategic Use of Honeypots in Network Security [online] http://www.cs.utep.edu/kiekintveld/papers/2014/klpgametheoreticfoundations.pdf
  • [9] William A 2008 International encyclopedia of the social sciences [online] http://www.columbia.edu/~rs328/NashEquilibrium.pdf
  • [10] Amory A, Naicker K, Jacky V and Adams C 1999 British Journal of EducationalTechnology 30(4)311
  • [11] Battigalli P and Dufwenberg M 2005 Dynamic Psychological Games, UCLA Departmentof Economics
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-d8ce311f-80dd-4ff8-b442-893beaacddc2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.