Results 1 to 10 of about 25,241 (287)

An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation [PDF]

open access: goldSustainability, 2022
It is undeniable that most business organizations rely on the Internet to conduct their highly competitive businesses nowadays. Cyber security is one of the important elements for companies to guarantee the normal operation of their business activities ...
Guangxu Wang   +3 more
openalex   +2 more sources

A Taxonomy of SETA Methods and Linkage to Delivery Preferences

open access: greenACM Sigmis Database, 2023
Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data.
Joakim Kävrestad   +2 more
openalex   +3 more sources

How Effective are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA ...
David Sikolia   +2 more
doaj   +2 more sources

Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling

open access: yesEuropean Journal of Information Systems, 2020
Online self-disclosure (OSD) on social networking sites can leave individuals and organisations vulnerable to security threats. Following a design science research (DSR) method, we created a gamified, “choose your own adventure” style security education,
Ersin Dincelli   +1 more
exaly   +2 more sources

Molecular and mechanical insights into gecko seta adhesion: multiscale simulations combining molecular dynamics and the finite element method [PDF]

open access: yesBeilstein Journal of Nanotechnology
Gecko adhesion, enabled by micro- and nanoscale structures known as setae and spatulae, has prompted extensive research. We present a concurrent multiscale computational model of a seta that integrates molecular dynamics to capture molecular interactions
Yash Jain   +4 more
doaj   +2 more sources

The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model

open access: yesInformation Technology and People, 2023
PurposeThis study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies ...
Areej Alyami   +2 more
exaly   +2 more sources

Development of a Series Elastic Tendon Actuator (SETA) Based on Gait Analysis for a Knee Assistive Exosuit

open access: yesActuators, 2022
An exosuit is a wearable robot that assists the muscular strength of a human that wears it by using multiple wires with similar functions to human muscles. This study focuses on the development of a series elastic tendon actuator (SETA) for the actuation
Hee Don Lee   +3 more
doaj   +2 more sources

The Glioma-associated Protein SETA Interacts with AIP1/Alix and ALG-2 and Modulates Apoptosis in Astrocytes [PDF]

open access: hybridJournal of Biological Chemistry, 2000
Expression of the src homology 3 (SH3) domain-containing expressed in tumorigenic astrocytes (SETA) gene is associated with the tumorigenic state in astrocytes.
Baihua Chen   +4 more
openalex   +2 more sources

Domain organization of Legionella effector SetA

open access: yesCellular Microbiology, 2012
Legionella pneumophila is a human pathogen causing severe pneumonia called Legionnaires' disease. Multiple Legionella effectors are type IV‐secreted into the host cell to establish a specific vesicular compartment for pathogen replication.
Carsten Schwan   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy