An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada

Traditional cybersecurity, security or information security awareness programs have become ineffective to change people’s behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2019
Institución:
Universidad del Rosario
Repositorio:
Repositorio EdocUR - U. Rosario
Idioma:
eng
OAI Identifier:
oai:repository.urosario.edu.co:10336/22276
Acceso en línea:
https://doi.org/10.4018/JCIT.2019070102
https://repository.urosario.edu.co/handle/10336/22276
Palabra clave:
Computer applications
Information systems
Awareness model
Awareness program
Awareness Training Delivery
Cyber security
Training evaluation
Network security
Awareness Training
Awareness Training Delivery
Awareness Training Evaluation
Cybersecurity
Cybersecurity Awareness Model
Cybersecurity Awareness Program
Cybersecurity Awareness Training
Rights
License
Bloqueado (Texto referencial)
id EDOCUR2_b4237eda3daed5d4b62201c4cdd99647
oai_identifier_str oai:repository.urosario.edu.co:10336/22276
network_acronym_str EDOCUR2
network_name_str Repositorio EdocUR - U. Rosario
repository_id_str
spelling 1f603bd0-d7d1-4c42-847f-fefd4f62723a600ba81c84b-a574-4aac-ba93-1f54b5bd752160042d8de23-c480-41df-8316-c09fcdc93513600edc6c608-62cf-4504-ab68-ec47ea1c045f6002020-05-25T23:55:57Z2020-05-25T23:55:57Z2019Traditional cybersecurity, security or information security awareness programs have become ineffective to change people’s behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape. Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.application/pdfhttps://doi.org/10.4018/JCIT.20190701021548-77171548-7725https://repository.urosario.edu.co/handle/10336/22276engIGI Global39No. 326Journal of Cases on Information TechnologyVol. 21Journal of Cases on Information Technology, ISSN:15487717, 15487725, Vol.21, No.3 (2019); pp. 26-39https://www.scopus.com/inward/record.uri?eid=2-s2.0-85065065001&doi=10.4018%2fJCIT.2019070102&partnerID=40&md5=3c7ee7517f82b935dd997217b5502a0ehttps://www.igi-global.com/gateway/article/227676#pnlRecommendationFormBloqueado (Texto referencial)http://purl.org/coar/access_right/c_14cbinstname:Universidad del Rosarioreponame:Repositorio Institucional EdocURComputer applicationsInformation systemsAwareness modelAwareness programAwareness Training DeliveryCyber securityTraining evaluationNetwork securityAwareness TrainingAwareness Training DeliveryAwareness Training EvaluationCybersecurityCybersecurity Awareness ModelCybersecurity Awareness ProgramCybersecurity Awareness TrainingAn effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in CanadaarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Sabillon, RegnerSerra-Ruiz, Jordicavaller, victorCano Martinez, Jeimy Jose10336/22276oai:repository.urosario.edu.co:10336/222762022-10-07 16:21:42.437https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co
dc.title.spa.fl_str_mv An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
title An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
spellingShingle An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
Computer applications
Information systems
Awareness model
Awareness program
Awareness Training Delivery
Cyber security
Training evaluation
Network security
Awareness Training
Awareness Training Delivery
Awareness Training Evaluation
Cybersecurity
Cybersecurity Awareness Model
Cybersecurity Awareness Program
Cybersecurity Awareness Training
title_short An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
title_full An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
title_fullStr An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
title_full_unstemmed An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
title_sort An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada
dc.subject.keyword.spa.fl_str_mv Computer applications
Information systems
Awareness model
Awareness program
Awareness Training Delivery
Cyber security
Training evaluation
Network security
Awareness Training
Awareness Training Delivery
Awareness Training Evaluation
Cybersecurity
Cybersecurity Awareness Model
Cybersecurity Awareness Program
Cybersecurity Awareness Training
topic Computer applications
Information systems
Awareness model
Awareness program
Awareness Training Delivery
Cyber security
Training evaluation
Network security
Awareness Training
Awareness Training Delivery
Awareness Training Evaluation
Cybersecurity
Cybersecurity Awareness Model
Cybersecurity Awareness Program
Cybersecurity Awareness Training
description Traditional cybersecurity, security or information security awareness programs have become ineffective to change people’s behavior in recognizing, failing to block or reporting cyberthreats within their organizational environment. As a result, human errors and actions continue to demonstrate that we are the weakest links in cybersecurity. This article studies the most recent cybersecurity awareness programs and its attributes. Furthermore, the authors compiled recent awareness methodologies, frameworks and approaches. The authors introduce a suggested awareness training model to address existing deficiencies in awareness training. The Cybersecurity Awareness TRAining Model (CATRAM) has been designed to deliver training to different organizational audiences, each of these groups with specific content and separate objectives. The authors concluded their study by addressing the need of future research to target new approaches to keep cybersecurity awareness focused on the everchanging cyberthreat landscape. Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
publishDate 2019
dc.date.created.spa.fl_str_mv 2019
dc.date.accessioned.none.fl_str_mv 2020-05-25T23:55:57Z
dc.date.available.none.fl_str_mv 2020-05-25T23:55:57Z
dc.type.eng.fl_str_mv article
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.spa.spa.fl_str_mv Artículo
dc.identifier.doi.none.fl_str_mv https://doi.org/10.4018/JCIT.2019070102
dc.identifier.issn.none.fl_str_mv 1548-7717
1548-7725
dc.identifier.uri.none.fl_str_mv https://repository.urosario.edu.co/handle/10336/22276
url https://doi.org/10.4018/JCIT.2019070102
https://repository.urosario.edu.co/handle/10336/22276
identifier_str_mv 1548-7717
1548-7725
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationEndPage.none.fl_str_mv 39
dc.relation.citationIssue.none.fl_str_mv No. 3
dc.relation.citationStartPage.none.fl_str_mv 26
dc.relation.citationTitle.none.fl_str_mv Journal of Cases on Information Technology
dc.relation.citationVolume.none.fl_str_mv Vol. 21
dc.relation.ispartof.spa.fl_str_mv Journal of Cases on Information Technology, ISSN:15487717, 15487725, Vol.21, No.3 (2019); pp. 26-39
dc.relation.uri.spa.fl_str_mv https://www.scopus.com/inward/record.uri?eid=2-s2.0-85065065001&doi=10.4018%2fJCIT.2019070102&partnerID=40&md5=3c7ee7517f82b935dd997217b5502a0e
dc.relation.uri.none.fl_str_mv https://www.igi-global.com/gateway/article/227676#pnlRecommendationForm
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_14cb
dc.rights.acceso.spa.fl_str_mv Bloqueado (Texto referencial)
rights_invalid_str_mv Bloqueado (Texto referencial)
http://purl.org/coar/access_right/c_14cb
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv IGI Global
institution Universidad del Rosario
dc.source.instname.spa.fl_str_mv instname:Universidad del Rosario
dc.source.reponame.spa.fl_str_mv reponame:Repositorio Institucional EdocUR
repository.name.fl_str_mv Repositorio institucional EdocUR
repository.mail.fl_str_mv edocur@urosario.edu.co
_version_ 1814167551885705216