Search results
1 – 6 of 6
Rayne Reid and Johan Van Niekerk
This research aims to determine whether the educational influence of the cybersecurity awareness campaign on the audience (their knowledge, behaviour and potential cybersecurity…
Abstract
Purpose
This research aims to determine whether the educational influence of the cybersecurity awareness campaign on the audience (their knowledge, behaviour and potential cybersecurity culture) matches the campaign’s educational objectives. The research focuses on the knowledge component of this metric by examining the awareness campaign audience’s interpretative role in processing the campaign content, through the lens of active audience theory (AAT).
Design/methodology/approach
Using reflective practices, this research examines a single longitudinal case study of a cybersecurity awareness and education campaign which aims to raise awareness amongst school learners. Artefacts from a single sample are examined.
Findings
Reflexive practices using theories such as active audience can assist in identifying deviations between the message a campaign intends to communicate and the message that the campaign audience receives.
Research limitations/implications
Using this research approach, measurements could only be obtained for campaign messages depicted in artefacts. Future interventions should be designed to facilitate a more rigorous analysis of the audiences’ interpretation of all campaign messages using ATT.
Originality/value
This paper applied principles of ATT to examine the audience’s interpretative role in processing an awareness campaign’s content based on artifacts they created after exposure to the campaign. Conducting such analyses as part of a reflective process between cyber awareness/education campaign cycles provides a way to identify areas or topics within the campaign that require corrective action.
Details
Keywords
Rayne Reid and Johan van Niekerk
– This paper aims to demonstrate that learners prefer brain-compatible cyber security educational material, over traditional presentation methods.
Abstract
Purpose
This paper aims to demonstrate that learners prefer brain-compatible cyber security educational material, over traditional presentation methods.
Design/methodology/approach
A prototype brain-compatible cyber security educational system was evaluated using a survey as a research instrument.
Findings
Presenting cyber security material in a brain-compatible manner is an effective way in which to stimulate the learners’ interest, engages them in the learning experience and motivates them to learn.
Originality/value
As far as could be determined, no previous studies showed the relevance of brain-compatible pedagogical techniques to cyber security education.
Details
Keywords
Rayne Reid and Johan Van Niekerk
This paper aims to educate the youth about information security. Cyber technologies and services are increasingly becoming integrated into individual’s daily lives. As such…
Abstract
Purpose
This paper aims to educate the youth about information security. Cyber technologies and services are increasingly becoming integrated into individual’s daily lives. As such, individuals are constantly being exposed to the benefits and risks of these technologies. Cyber security knowledge and skills are becoming fundamental life skills for today’s users. This is particularly true for the current generation of digital natives.
Design/methodology/approach
Within the design science paradigm, several case studies are used to evaluate the research artefact.
Findings
The authors believe that the presented artefact could effectively convey basic information security concepts to the youth.
Research limitations/implications
This study had a number of limitations. First, all the learner groups who participated in this study were too small to enable analysis of findings for statistical significance. Second, the data compiled on the long-term effectiveness of the game for Group B was incomplete. This limitation was the result of School B’s ethical concerns regarding learners being a vulnerable target audience.
Originality/value
This paper presents and evaluates a brain-compatible, information security educational game that can be used to introduce information security concepts to the youth from a very young age.
Details
Keywords
Up until 1993, the South African armed forces were an essentially all-white conscript force, fighting a war ‘in proxy’ in neighbouring states and within the country, against a…
Abstract
Up until 1993, the South African armed forces were an essentially all-white conscript force, fighting a war ‘in proxy’ in neighbouring states and within the country, against a perceived communist onslaught. During this period, the former South African Defence Force (SADF) was central to state functioning and funding. With the end of the Cold War and the subsequent demise of Apartheid, the armed forces were forced to adapt not only to the new security environment, but to the imperatives spelt out in the newly forged Constitution of the Republic of South Africa. This was to be a traumatic time for the newly established South African National Defence Force (SANDF), which came into being in April 1994. The challenge of having to integrate seven former enemies into one cohesive force has been no mean task, and the legacies of past loyalties continue to divide the forces. The challenges stretched beyond just the need to integrate, thereby swelling the size of the SANDF, but to downscale the forces to affordable levels in years to come. As Seegers (1996, p. 280) states, “the SANDF encountered two big problems simultaneously, integration and a desperate popular need for employment”. Therefore, rationalisation would inevitably be met with some collective resistance. Adapting to the principles enshrined in the Constitution also meant that the SANDF had to adapt its policies and practices to meet the democratic imperatives spelt out in the Bill of Rights. Without doubt, one of the most contentious issues was the pressure exerted on the SANDF, even before 1994, to amend its labour relations mechanisms for uniformed personnel. The Constitution provided the legal sanction for military unions and despite vehement resistance, the SANDF eventually had to concede to this right when it lost the case in the Constitutional Court in 1998. Even so, the shock of having to deal with trade unions within its ranks and to bargain with the unions over “all matters of mutual interest” has been no mean feat.
Berdy Briggitte Cuya-Velásquez, Aldo Alvarez-Risco, Marián Arias-Meza, Maria de las Mercedes Anderson-Seminario and Shyla Del-Aguila-Arcentales
An important sector that presents continuous growth year after year and one of the most notable economic sectors worldwide is hospitality and tourism (H&T). For this reason, many…
Abstract
An important sector that presents continuous growth year after year and one of the most notable economic sectors worldwide is hospitality and tourism (H&T). For this reason, many enterprises have been created and developed. Each journey could face several challenges, such as economic, social, political, environmental, and technological. This study examines research and case studies about H&T entrepreneurship and provides new insights into the current industry about all aspects that affect entrepreneurship development. Additionally, the impacts of the spread of COVID-19 in the current industry and the changes in the awareness of tourists to enjoy more sustainable tourism that protects the planet during their daily operations are addressed; this being a new opportunity for business so that entrepreneurs can compete in a hypercompetitive market.
Details