You are not logged in.

Performance analysis of cyber security awareness delivery methods

Abawajy, Jemal and Kim, Tai-hoon 2010, Performance analysis of cyber security awareness delivery methods. In Kim, Tai-hoon, Fang, Wai-chi, Khan, Muhammad Khurram, Arnett, Kirk P., Kang, Heau-jo and Slezak, Dominik (ed), Security technology, disaster recovery and business continuity, Spring-Verlag, Berlin, Germany, pp.142-148, doi: 10.1007/978-3-642-17610-4_16.

Attached Files
Name Description MIMEType Size Downloads

Title Performance analysis of cyber security awareness delivery methods
Author(s) Abawajy, JemalORCID iD for Abawajy, Jemal
Kim, Tai-hoon
Title of book Security technology, disaster recovery and business continuity
Editor(s) Kim, Tai-hoon
Fang, Wai-chi
Khan, Muhammad Khurram
Arnett, Kirk P.
Kang, Heau-jo
Slezak, Dominik
Publication date 2010
Series Communications in computer and information science; v.122
Chapter number 16
Total chapters 34
Start page 142
End page 148
Total pages 7
Publisher Spring-Verlag
Place of Publication Berlin, Germany
Summary In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.
ISBN 3642176097
ISSN 1865-0929
Language eng
DOI 10.1007/978-3-642-17610-4_16
Field of Research 080504 Ubiquitous Computing
Socio Economic Objective 890299 Computer Software and Services not elsewhere classified
HERDC Research category B1 Book chapter
HERDC collection year 2010
Copyright notice ©2010, Springer-Verlag Berlin
Persistent URL

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 5 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 676 Abstract Views, 22 File Downloads  -  Detailed Statistics
Created: Sat, 04 Dec 2010, 11:53:22 EST by Jemal Abawajy

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact