48,843 research outputs found

    Implementing an effective information security awareness program

    Get PDF
    The aim of this project and dissertation is to develop an effective information security awareness program that can be implemented within an organization. The project starts with a literature study that focuses on the requirements for an information security awareness program, research that has already been done in this area and behavioural issues that need to be considered during the implementation of such a program. A secondary deliverable of this project is to develop a web-based security awareness program that can be used to make employees more security aware and that should compliment a total security awareness program within an organization. Chapter 1 provides an overview of the problem statement, the objectives and structure of the project and dissertation, and the approach that was followed to solve the problem. In chapter 2 the concept of security awareness and the different components it consists of, are defined. The difference between awareness, training, and education, and the importance of implementing a security awareness environment within an organization, will be explained. Chapter 3 discusses the ISO 17799 security standard and what it says about security awareness and the importance of employee training. The security awareness prototype that was developed as part of this study plays a role in achieving the training objective. The Attitude problem is the focus of chapter 4. In order for a security awareness program to be effective, people’s attitude towards change must be changed. It is also important to measure the behavioural change to make sure that the attitude towards change did change. The security awareness prototype is introduced in this chapter and mentioned that this can be used to assist an organization to achieve their security awareness goals. Chapter 5 introduces the security awareness prototype in more detail. This prototype is an example of a web environment that can be used to train users to a higher degree of security awareness. Chapter 6 goes into more detail about the structure of the security awareness web environment. Access control and how it is achieved is explained. The objectives of the 10 modules and the test at the end of each module are also mentioned. Links and reports can also form part of this prototype to make it a more comprehensive solution. Chapter 7 provides an overview of a case study that I researched. It focuses on research done by Hi-Performance Learning about the human factor that is involved in any training program. I explain how they succeeded in addressing this and people’s sensitivity towards change. Chapter 8 explains the importance of choosing the right course content, learning media and course structure and how this led me to develop a web-based security awareness prototype. Other mechanisms like posters and brochures that can be used as part of a comprehensive security awareness program are discussed in chapter 9. Chapter 10 concludes the dissertation by providing an overview of how the security awareness program can be implemented and managed within an organization. A summary of how the objectives of this project and dissertation were met, are given at the end of this chapter.Von Solms, S.H., Prof

    DuPage County, Illinois, Plan to End Homelessness: Progress at the Five-Year Mark and a Blueprint for Moving Forward

    Get PDF
    The DuPage County Homeless Continuum of Care (CoC) was an early leader nationally and locally in the development and implementation of its 10-Year Plan to End Homelessness in 2003. In October 2007, the Heartland Alliance Mid-America Institute on Poverty was hired to conduct the evaluation and to facilitate a planning process to inform the update of the Plan.This report documents the tremendous successes of the past five years, outlines the process by which stakeholders were re-energized and re-engaged, and establishes a new blueprint for success for the coming five years. The DuPage County CoC is proceeding from this point even more committed to collaboration and success in ending homelessness in DuPage County

    Combating Fake News on Social Media: A Framework, Review, and Future Opportunities

    Get PDF
    Social media platforms facilitate the sharing of a vast magnitude of information in split seconds among users. However, some false information is also widely spread, generally referred to as “fake news”. This can have major negative impacts on individuals and societies. Unfortunately, people are often not able to correctly identify fake news from truth. Therefore, there is an urgent need to find effective mechanisms to fight fake news on social media. To this end, this paper adapts the Straub Model of Security Action Cycle to the context of combating fake news on social media. It uses the adapted framework to classify the vast literature on fake news to action cycle phases (i.e., deterrence, prevention, detection, and mitigation/remedy). Based on a systematic and inter-disciplinary review of the relevant literature, we analyze the status and challenges in each stage of combating fake news, followed by introducing future research directions. These efforts allow the development of a holistic view of the research frontier on fighting fake news online. We conclude that this is a multidisciplinary issue; and as such, a collaborative effort from different fields is needed to effectively address this problem

    Promoting Bicycle Commuter Safety, Research Report 11-08

    Get PDF
    We present an overview of the risks associated with cycling to emphasize the need for safety. We focus on the application of frameworks from social psychology to education, one of the 5 Es—engineering, education, enforcement, encouragement, and evaluation. We use the structure of the 5 Es to organize information with particular attention to engineering and education in the literature review. Engineering is essential because the infrastructure is vital to protecting cyclists. Education is emphasized since the central focus of the report is safety

    Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization

    Full text link
    Persuasion is part and parcel of human interaction. The human persuaders in society have been always exit, masters of rhetoric skilled of changing our minds, or at least our behaviors. Leaders, mothers, salesmen, and teachers are clear examples of persuaders. Persuaders often turn to technology and digital media to amplify their persuasive ends. Besides, our lives and how we lead them influenced by technologies and digital media,but for the most part, their effects on our attitudes and behaviors have been incidental, even accidental. Although, nowadays, the use of computers to sell products and services considered as the most frequent application of persuasive technology. In this short paper, based on an extensive review of literatures, we aim to give a brief introduction to persuasive technology, and how it can play a role and contribute to enhance and deliver the best practice of IT. Some challenges of persuasive technology have been discussed. At the end, some recommendations and steps should be taken place to empower IT professional practices have been listed.Comment: 7 pages, 1 table, Published with International Journal of Computer Trends and Technology (IJCTT

    Digital Citizenship in 21st Century Education

    Get PDF
    Recent Federal Government initiatives have affected equitable public school funding, which prevents many schools from becoming compliant with the California Common Core Standards. Presently, public schools in California must adopt Common Core State standards, which require the integration of technology within the classroom, however, there are no specific standards and or guidelines within the CCCS that address how students should safely conduct themselves online. This has left students and teachers unprepared to adequately support the growing needs of students online, especially without standards addressing digital literacy. Students who go online face cyberbullying, predatory contact, identity theft and other consequences that may affect their future including the permanence of their digital footprint. Using Howard Gardner and Common Sense Media’s end of unit assessment on digital citizenship and Dr. Mike Ribble’s Nine Elements of Digital Citizenship, this study inquired into what a sample group of fifth grade students know about digital citizenship. Researcher examined how their knowledge relates to the California Common Core Standards (CCCS) and 21st century skills. The study found that only 32% of the sample group of 88 participants had sufficient knowledge about digital citizenship. The results of this study indicate that the majority of students within this sample are active online without proper knowledge of what digital citizenship means, which may be putting them at risk. A digital citizenship program that addresses access, commerce, communications, etiquette, law, health, wellness, rights, and responsibilities, is recommended to support children online
    • …
    corecore