Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Stewart Kowalski"'
Autor:
Mazaher Kianpour, Stewart Kowalski
While academic interest has grown in using gamification in training different aspects of cybersecurity, the research remains sparse on the design and development of games that focus on integrated concepts of security and sustainability. This chapter
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7d0f48e7f8b1e9a8431f74003f08ca72
https://doi.org/10.4018/978-1-6684-4291-3.ch009
https://doi.org/10.4018/978-1-6684-4291-3.ch009
Autor:
Grethe Østby, Stewart Kowalski
In this chapter, the authors outline their process for introducing serious games as a course in an Information Security Master Course Program at the Norwegian University of Science and Technology. The process is built on the author's experiences from
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b19f509426c8f4c03251296ff6858b9
https://doi.org/10.4018/978-1-7998-9223-6.ch023
https://doi.org/10.4018/978-1-7998-9223-6.ch023
Publikováno v:
Sustainability; Volume 13; Issue 24; Pages: 13677
Sustainability
Sustainability, Vol 13, Iss 13677, p 13677 (2021)
Sustainability
Sustainability, Vol 13, Iss 13677, p 13677 (2021)
Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the sustainability of digital ecosy
Autor:
Basel Katt, Stewart Kowalski
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9954652571776a205419fcef88a7b2de
https://doi.org/10.1007/978-3-642-27739-9_1583-1
https://doi.org/10.1007/978-3-642-27739-9_1583-1
Autor:
Bilal AlSabbagh, Stewart Kowalski
This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d8f4364a02f628e1046c5974f9db8ef4
https://doi.org/10.4018/978-1-7998-7705-9.ch009
https://doi.org/10.4018/978-1-7998-7705-9.ch009
Publikováno v:
CogSIMA
Heterogeneous interacting socio-technical systems, distinct by their own cultures, structures, methods, and machines, are transforming the process of making informed decisions and assessment of situations in the context of cybersecurity into a seriou
Autor:
Stewart Kowalski, Grethe Østby
Publikováno v:
Augmented Cognition. Human Cognition and Behavior ISBN: 9783030504380
HCI (17)
HCI (17)
In this paper the authors discuss how to create a preparation schedule for ex-ercises (PSE) to support EXCON-teams and instructors for full-scaled com-bined crisis management and cyber-exercises. The process to create the prep-aration schedule starts
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8dbe4bc26545f1901e28e2296f1a4181
https://hdl.handle.net/11250/2736430
https://hdl.handle.net/11250/2736430
Autor:
Stewart Kowalski, Bilal AlSabbagh
Publikováno v:
International Journal of Systems and Society. 4:8-21
This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the
Publikováno v:
Complex Systems Informatics and Modeling Quarterly; No 18 (2019): Complex Systems Informatics and Modeling Quarterly; 65-75
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 65-75 (2019)
Complex Systems Informatics and Modeling Quarterly
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 65-75 (2019)
Complex Systems Informatics and Modeling Quarterly
Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related policies and what should be
Publikováno v:
Complex Systems Informatics and Modeling Quarterly; No 18 (2019): Complex Systems Informatics and Modeling Quarterly; 47-64
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 47-64 (2019)
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 18, Pp 47-64 (2019)
Cyber security risks are socio-technical in nature. They result not just from technical vulnerabilities but also, more fundamentally, from the degradation of working practices over time – which move an organization across the boundary of secure pra