Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heinrich, Peter | - |
dc.contributor.author | Uhl, Axel | - |
dc.contributor.author | Josi, Monika | - |
dc.date.accessioned | 2019-05-03T09:48:45Z | - |
dc.date.available | 2019-05-03T09:48:45Z | - |
dc.date.issued | 2018 | - |
dc.identifier.isbn | 978-1-86137-667-1 | de_CH |
dc.identifier.uri | https://aisel.aisnet.org/ecis2018_rp/24/ | de_CH |
dc.identifier.uri | https://digitalcollection.zhaw.ch/handle/11475/17007 | - |
dc.description.abstract | Cybercrime proliferates and cyber-security seems evermore challenging. Literature offers large support that cyber-security is rather of behavioral than of pure technical matter. While prior research has focused on explaining organizational and individual (mis)behavior and agreed on the crucial role of cyber-security education programs, less is known on the question of what to teach in order to change behavior. With an exhaustive literature review, this article helps to build a foundation for developing training based interventions, grounded on strong behavioral models, taking a knowledge management view to foster behavioral change by supplying relevant knowledge entities. Embedded in a stream of design science research (DSR) activities this article reports on DSR’s first two phases, problem description and definition of solution objectives. This article ends with a set of design requirements to a cyber- security training environment in terms of content and learning approach grounded on the results of the literature review. | de_CH |
dc.language.iso | en | de_CH |
dc.publisher | Association for Information Systems | de_CH |
dc.rights | Licence according to publishing contract | de_CH |
dc.subject | Cyber-Security training | de_CH |
dc.subject | Knowledge | de_CH |
dc.subject | Protective behavior | de_CH |
dc.subject.ddc | 005: Computerprogrammierung, Programme und Daten | de_CH |
dc.title | Designing for knowledge based cyber-security : episode 1 : what should we teach? | de_CH |
dc.type | Konferenz: Paper | de_CH |
dcterms.type | Text | de_CH |
zhaw.departement | School of Management and Law | de_CH |
zhaw.organisationalunit | Institut für Wirtschaftsinformatik (IWI) | de_CH |
zhaw.conference.details | 26th European Conference on Information Systems (ECIS 2018), Portsmouth, UK, 23-28 June 2018 | de_CH |
zhaw.funding.eu | No | de_CH |
zhaw.originated.zhaw | Yes | de_CH |
zhaw.publication.status | publishedVersion | de_CH |
zhaw.publication.review | Peer review (Abstract) | de_CH |
zhaw.title.proceedings | ECIS 2018 Proceedings | de_CH |
Appears in collections: | Publikationen School of Management and Law |
Files in This Item:
There are no files associated with this item.
Show simple item record
Heinrich, P., Uhl, A., & Josi, M. (2018). Designing for knowledge based cyber-security : episode 1 : what should we teach? ECIS 2018 Proceedings. https://aisel.aisnet.org/ecis2018_rp/24/
Heinrich, P., Uhl, A. and Josi, M. (2018) ‘Designing for knowledge based cyber-security : episode 1 : what should we teach?’, in ECIS 2018 Proceedings. Association for Information Systems. Available at: https://aisel.aisnet.org/ecis2018_rp/24/.
P. Heinrich, A. Uhl, and M. Josi, “Designing for knowledge based cyber-security : episode 1 : what should we teach?,” in ECIS 2018 Proceedings, 2018. [Online]. Available: https://aisel.aisnet.org/ecis2018_rp/24/
HEINRICH, Peter, Axel UHL und Monika JOSI, 2018. Designing for knowledge based cyber-security : episode 1 : what should we teach? In: ECIS 2018 Proceedings [online]. Conference paper. Association for Information Systems. 2018. ISBN 978-1-86137-667-1. Verfügbar unter: https://aisel.aisnet.org/ecis2018_rp/24/
Heinrich, Peter, Axel Uhl, and Monika Josi. 2018. “Designing for Knowledge Based Cyber-Security : Episode 1 : What Should We Teach?” Conference paper. In ECIS 2018 Proceedings. Association for Information Systems. https://aisel.aisnet.org/ecis2018_rp/24/.
Heinrich, Peter, et al. “Designing for Knowledge Based Cyber-Security : Episode 1 : What Should We Teach?” ECIS 2018 Proceedings, Association for Information Systems, 2018, https://aisel.aisnet.org/ecis2018_rp/24/.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.