dc.contributor.author |
Muronga, Khangwelo
|
|
dc.contributor.author |
Herselman, Martha E
|
|
dc.contributor.author |
Botha, Adèle
|
|
dc.contributor.author |
Da Veiga, A
|
|
dc.date.accessioned |
2019-12-19T13:14:08Z |
|
dc.date.available |
2019-12-19T13:14:08Z |
|
dc.date.issued |
2019-09 |
|
dc.identifier.citation |
Muronga, K., Herselman, M.E., Botha, A and Da Veiga, A. 2019. An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review. 2nd International Conference on Next Generation Computing Applications, Faculty of Information, Communication and Digital Technologies, Mauritius, 19 –21 September 2019. |
en_US |
dc.identifier.isbn |
978-1-7281-1460-6 |
|
dc.identifier.isbn |
978-1-7281-1461-3 |
|
dc.identifier.uri |
DOI: 10.1109/NEXTCOMP.2019.8883535
|
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/8883535
|
|
dc.identifier.uri |
https://52ef1423-61aa-4f3b-92c2-b7c98e5ae715.filesusr.com/ugd/11fb62_b605284ff3b648899717a70087d334a3.pdf
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/11281
|
|
dc.description |
Copyright: 2019 IEEE. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website. |
en_US |
dc.description.abstract |
This study aimed to ascertain the types of approaches that are applied in the assessments of information security and cybersecurity user awareness and training programs. The study focused on achieving two objectives. The first objective focused on to find out what measurements are used in the assessment of the effectiveness of information security and cybersecurity user awareness and training programs. The second objective focused on studies that made use of maturity models to measure the progress of these programs. A Scoping Literature Review process was followed to achieve these objectives. The study found that there is a gap in current literature with regards to the assessment of these programs, as only five papers and two maturity models focused on the assessment of these programs. The study further recommends that more studies be conducted in the assessment of these programs, as most researchers are encouraging the use of the programs in the fight against cyber-attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;22898 |
|
dc.subject |
Information Security |
en_US |
dc.subject |
Cybersecurity |
en_US |
dc.subject |
User awareness |
en_US |
dc.title |
An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Muronga, K., Herselman, M. E., Botha, A., & Da Veiga, A. (2019). An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review. IEEE. http://hdl.handle.net/10204/11281 |
en_ZA |
dc.identifier.chicagocitation |
Muronga, Khangwelo, Martha E Herselman, Adèle Botha, and A Da Veiga. "An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review." (2019): http://hdl.handle.net/10204/11281 |
en_ZA |
dc.identifier.vancouvercitation |
Muronga K, Herselman ME, Botha A, Da Veiga A, An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review; IEEE; 2019. http://hdl.handle.net/10204/11281 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Muronga, Khangwelo
AU - Herselman, Martha E
AU - Botha, Adèle
AU - Da Veiga, A
AB - This study aimed to ascertain the types of approaches that are applied in the assessments of information security and cybersecurity user awareness and training programs. The study focused on achieving two objectives. The first objective focused on to find out what measurements are used in the assessment of the effectiveness of information security and cybersecurity user awareness and training programs. The second objective focused on studies that made use of maturity models to measure the progress of these programs. A Scoping Literature Review process was followed to achieve these objectives. The study found that there is a gap in current literature with regards to the assessment of these programs, as only five papers and two maturity models focused on the assessment of these programs. The study further recommends that more studies be conducted in the assessment of these programs, as most researchers are encouraging the use of the programs in the fight against cyber-attacks.
DA - 2019-09
DB - ResearchSpace
DP - CSIR
KW - Information Security
KW - Cybersecurity
KW - User awareness
LK - https://researchspace.csir.co.za
PY - 2019
SM - 978-1-7281-1460-6
SM - 978-1-7281-1461-3
T1 - An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review
TI - An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A scoping review
UR - http://hdl.handle.net/10204/11281
ER -
|
en_ZA |