1
|
Carlton M, Levy Y, Ramim M. Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-11-2016-0088] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeUsers’ mistakes due to poor cybersecurity skills result in up to 95 per cent of cyber threats to organizations. Threats to organizational information systems continue to result in substantial financial and intellectual property losses. This paper aims to design, develop and empirically test a set of scenarios-based hands-on tasks to measure the cybersecurity skills of non-information technology (IT) professionals.Design/methodology/approachThis study was classified as developmental in nature and used a sequential qualitative and quantitative method to validate the reliability of the Cybersecurity Skills Index (CSI) as a prototype-benchmarking tool. Next, the prototype was used to empirically test the demonstrated observable hands-on skills level of 173 non-IT professionals.FindingsThe importance of skills and hands-on assessment appears applicable to cybersecurity skills of non-IT professionals. Therefore, by using an expert-validated set of cybersecurity skills and scenario-driven tasks, this study established and validated a set of hands-on tasks that measure observable cybersecurity skills of non-IT professionals without bias or the high-stakes risk to IT.Research limitations/implicationsData collection was limited to the southeastern USA and while the sample size of 173 non-IT professionals is valid, further studies are required to increase validation of the results and generalizability.Originality/valueThe validated and reliable CSI operationalized as a tool that measures the cybersecurity skills of non-IT professionals. This benchmarking tool could assist organizations with mitigating threats due to vulnerabilities and breaches caused by employees due to poor cybersecurity skills.
Collapse
|
2
|
|
3
|
Wang YS, Li HT, Li CR, Wang C. A model for assessing blog-based learning systems success. ONLINE INFORMATION REVIEW 2014. [DOI: 10.1108/oir-04-2014-0097] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
– Based on previous information systems/educational technology success models, the purpose of this paper is to establish a comprehensive, multidimensional model for assessing blog-based learning systems success.
Design/methodology/approach
– Data collected from 240 blog-based learning systems users in the context of higher education were tested against the model using the structural equation modelling approach.
Findings
– The results indicate the interrelationships between six system success variables: system quality, content quality, context and linkage quality, user satisfaction, system use, and learning performance. In particular, this study confirms that quality attributes positively affect user satisfaction, which in turn positively influences learning performance directly or indirectly through the mediation of system use.
Originality/value
– This study is a pioneering effort to develop and validate a blog-based learning systems success model.
Collapse
|