메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Design of cyber security awareness game utilizing a social media framework

Author keywords

application; awareness; security; social networking; threat; vulnerability

Indexed keywords

AWARENESS; CYBER SECURITY; GAME DESIGN; HYPERMEDIA; INTERACTIVE GAMES; SECURITY; SECURITY THREATS; SOCIAL MEDIA; SOCIAL NETWORKING SITES; SOCIAL NETWORKS; THREAT; USER ACCEPTANCE; VIRTUAL TOOL; VULNERABILITY;

EID: 80053992653     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSA.2011.6027538     Document Type: Conference Paper
Times cited : (38)

References (22)
  • 1
    • 77956620263 scopus 로고    scopus 로고
    • The positive outcomes of information security awareness training in companies-A case study
    • M. Eminagaoglu, E. Uçar and S. Eren, "The positive outcomes of information security awareness training in companies-A case study," Information Security Technical Report, vol. 14, pp. 223-229, 2009.
    • (2009) Information Security Technical Report , vol.14 , pp. 223-229
    • Eminagaoglu, M.1    Uçar, E.2    Eren, S.3
  • 2
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: An exploratory study
    • Y. Rezgui and A. Marks, "Information security awareness in higher education: An exploratory study," Computers & Security, vol. 27, pp. 241-253, 2008.
    • (2008) Computers & Security , vol.27 , pp. 241-253
    • Rezgui, Y.1    Marks, A.2
  • 3
    • 78449305755 scopus 로고    scopus 로고
    • Cyber Security for home users: A New Way of Protection through Awareness Enforcement
    • November
    • E. Kritzinger and S.H. von Solms, "Cyber Security for home users: A New Way of Protection through Awareness Enforcement," Computers & Security, vol. 29, pp. 840-847, November. 2010.
    • (2010) Computers & Security , vol.29 , pp. 840-847
    • Kritzinger, E.1    Von Solms, S.H.2
  • 4
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    • 6
    • E. Albrechtsen and J. Hovden, "Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study," Computers & Security, vol. 29, pp. 432-445, 6. 2010.
    • (2010) Computers & Security , vol.29 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2
  • 5
    • 33846794868 scopus 로고    scopus 로고
    • Phishing for user security awareness
    • R.C. Dodge, "Phishing for user security awareness," Computers & Security, vol. 26, pp. 73-80, 2007.
    • (2007) Computers & Security , vol.26 , pp. 73-80
    • Dodge, R.C.1
  • 6
    • 56249140028 scopus 로고    scopus 로고
    • The impact of information richness on information security awareness training effectiveness
    • 1
    • R.S. Shaw, C.C. Chen, A.L. Harris and H. Huang, "The impact of information richness on information security awareness training effectiveness," Computers & Education, vol. 52, pp. 92-100, 1. 2009.
    • (2009) Computers & Education , vol.52 , pp. 92-100
    • Shaw, R.S.1    Chen, C.C.2    Harris, A.L.3    Huang, H.4
  • 7
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • DOI 10.1016/j.cose.2006.02.008, PII S0167404806000563
    • H.A. Kruger and W.D. Kearney, "A prototype for assessing information security awareness," Computers & Security, vol. 25, pp. 289-296, 2006. (Pubitemid 44202198)
    • (2006) Computers and Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 8
    • 2342622104 scopus 로고    scopus 로고
    • Why do people play on-line games? An extended TAM with social influences and flow experience
    • C.L. Hsu and H.P. Lu, "Why do people play on-line games? An extended TAM with social influences and flow experience," Information & Management, vol. 41, pp. 853-868, 2004.
    • (2004) Information & Management , vol.41 , pp. 853-868
    • Hsu, C.L.1    Lu, H.P.2
  • 11
    • 80053940314 scopus 로고    scopus 로고
    • The game layer on top of the world
    • vol.
    • S. Priebatsch, "The game layer on top of the world," vol. Podcast, 2010.
    • (2010) Podcast
    • Priebatsch, S.1
  • 12
    • 80053950420 scopus 로고    scopus 로고
    • Internet Threats Trend Report
    • I. Commtouch, "Internet Threats Trend Report," Commtouch., 2011.
    • (2011) Commtouch.
    • Commtouch, I.1
  • 15
    • 0000430606 scopus 로고    scopus 로고
    • Extending the TAM for a World-Wide-Web context
    • J.W. Moon and Y.G. Kim, "Extending the TAM for a World-Wide-Web context," Information & Management, vol. 38, pp. 217-230, 2001.
    • (2001) Information & Management , vol.38 , pp. 217-230
    • Moon, J.W.1    Kim, Y.G.2
  • 20
    • 80053991259 scopus 로고    scopus 로고
    • "CyberCIEGE Educational Video Game," Available at: Accessed 20110110
    • The Center for Information Systems Security Studies and Research, INC., "CyberCIEGE Educational Video Game," "CyberCIEGE Educational Video Game," Available at: http://www.cisr.us/cyberciege/,Accessed 20110110.
    • CyberCIEGE Educational Video Game
  • 21
    • 80053997590 scopus 로고    scopus 로고
    • Department of Defence (United States of America), DOD., Available at Accessed 20110110
    • Department of Defence (United States of America), DOD., "CyberProtect," Available at http://iase.disa.mil/eta/cyberprotect/ launchpage.htm., Accessed 20110110.
    • CyberProtect
  • 22
    • 84880439537 scopus 로고    scopus 로고
    • Availabe at Accessed 20110121
    • S. Khan, "Let's use video to reinvent education," Availabe at http://www.ted.com/talks/salman-khan-let-s-use-video-to-reinvent-ed ucation.html, Accessed 20110121.,
    • Let's Use Video to Reinvent Education
    • Khan, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.