11/29/2022 0 Comments Mufakham in rules of raa![]() ![]() Employing literature search of scholarly and practitioner works, together with cyber security standards from governmental and non-governmental organizations, the chapter integrates cyber security domain knowledge, learning theories, and learning continuum hierarchy to design a model of cyber security competencies suitable for use in educating individuals and the general workforce. This chapter proposes a cyber security competency model that integrates learning theories (cognitive, affective, and psychomotor), learning continuum hierarchy (awareness and training), and cyber security domain knowledge. ![]() There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks emanating from the prevailing and emerging cyber-attacks. Also, all the participants of the survey agreed on the need for ethics in the pervasive use of the Internet where problems in security, privacy enforcement and threats of viruses are obvious and cannot be avoided. The paper shows that most of the participants of the survey were not able to actively keep themselves updated with the latest information related to computer security and this fact seems consistent across the different professions. The paper presents the result of a survey conducted to find out the general awareness of cyber laws and computer security among Singaporeans, covering a cross section of the computer users in the country. Many countries have formulated cyber laws to protect their business, security, and user's rights and privacy and for educating people about their own and other countries cyber laws so that they do not have any problems relating to information security over Internet. ![]() Importance of safe computing practices being advocated by several governments, professional organisations, and individuals has impelled the need for secured commercial computer and application systems. Concern about information security is also on because of financial risks associated with it. Security threats over Internet have necessitated information security awareness among the users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |