2007
DOI: 10.1016/j.cose.2006.10.005
|View full text |Cite
|
Sign up to set email alerts
|

A video game for cyber security training and awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
90
0
3

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 181 publications
(105 citation statements)
references
References 10 publications
(8 reference statements)
2
90
0
3
Order By: Relevance
“…[3] The game is extensible in that new CyberCIEGE scenarios tailored to specific audiences and topics are easily created. The scenario definition language expresses security-related risk management trade-offs to be developed for different scenarios.…”
Section: Basic Cyberciege Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…[3] The game is extensible in that new CyberCIEGE scenarios tailored to specific audiences and topics are easily created. The scenario definition language expresses security-related risk management trade-offs to be developed for different scenarios.…”
Section: Basic Cyberciege Componentsmentioning
confidence: 99%
“…At the simple end of the spectrum, scenarios can be constructed to make students aware of the importance of strong passwords and the dangers of email attachments [3]. More complex scenarios teach students how to configure systems and networks, for example how to set up router filtering to support various policy objectives.…”
Section: Introductionmentioning
confidence: 99%
“…Formal Training S essions represent the traditional approach to user training and awareness [9]. It could be in form of a video, in person training or specialised online training.…”
Section: Common Current Training and Awareness Techniquesmentioning
confidence: 99%
“…There are a number of government-sponsored sites with tips, newsletters, resources and even videos for home users and small businesses 3. S trategic placement of awareness messages can raise the level of awareness through the delivery of the message by methods such as posters in public places, email messages, and media (TV adverts, newspapers) [9].…”
Section: Common Current Training and Awareness Techniquesmentioning
confidence: 99%
“…Education is a core component of the defence-in-depth model and in the instance of semantic attacks relates to areas where technical security mechanisms have proven to be inadequate. Interactive training maximises learning and awareness, such as bite-size quizzes, tests or games [Kumaraguru 2009;Cone et al 2007;Arachchilage et al 2012;Sheng et al 2007], which when applied periodically provide education on the characteristics of different attack types. A large proportion of research into awareness training has focused on the approach of content, the methodology of its delivery and how data gathered from testing and formal application can be used to shape security policy and user training programmes [Kruger and Wayne 2006;Kirlappos and Sasse 2012].…”
Section: Organisationalmentioning
confidence: 99%