Results 1 to 10 of about 214,314 (238)

The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model

open access: yesInformation Technology and People, 2023
PurposeThis study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies ...
Areej Alyami   +2 more
exaly   +2 more sources

How Effective are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA ...
David Sikolia   +2 more
doaj   +2 more sources

Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling

open access: yesEuropean Journal of Information Systems, 2020
Online self-disclosure (OSD) on social networking sites can leave individuals and organisations vulnerable to security threats. Following a design science research (DSR) method, we created a gamified, “choose your own adventure” style security education,
Ersin Dincelli   +1 more
exaly   +2 more sources

Molecular and mechanical insights into gecko seta adhesion: multiscale simulations combining molecular dynamics and the finite element method [PDF]

open access: yesBeilstein Journal of Nanotechnology
Gecko adhesion, enabled by micro- and nanoscale structures known as setae and spatulae, has prompted extensive research. We present a concurrent multiscale computational model of a seta that integrates molecular dynamics to capture molecular interactions
Yash Jain   +4 more
doaj   +2 more sources

Development of a Series Elastic Tendon Actuator (SETA) Based on Gait Analysis for a Knee Assistive Exosuit

open access: yesActuators, 2022
An exosuit is a wearable robot that assists the muscular strength of a human that wears it by using multiple wires with similar functions to human muscles. This study focuses on the development of a series elastic tendon actuator (SETA) for the actuation
Hee Don Lee   +3 more
doaj   +2 more sources

Role of scheimpflug imaging in the diagnosis and management of keratitis caused by caterpillar seta

open access: yesOman Journal of Ophthalmology, 2010
A 16-year-old boy presented with a history of an accidental hit to the left eye by a butterfly (Lepidoptera). One seta fragment was found to be embedded into the cornea and inflammation secondary to penetration of caterpillar seta was seen around the ...
Ozgur Bulent Timucin, Mehmet Baykara
exaly   +3 more sources

Domain organization of Legionella effector SetA

open access: yesCellular Microbiology, 2012
Legionella pneumophila is a human pathogen causing severe pneumonia called Legionnaires' disease. Multiple Legionella effectors are type IV‐secreted into the host cell to establish a specific vesicular compartment for pathogen replication.
Carsten Schwan   +2 more
exaly   +2 more sources

The Glioma-associated Protein SETA Interacts with AIP1/Alix and ALG-2 and Modulates Apoptosis in Astrocytes

open access: yesJournal of Biological Chemistry, 2000
Expression of the src homology 3 (SH3) domain-containing expressed in tumorigenic astrocytes (SETA) gene is associated with the tumorigenic state in astrocytes.
Scott C Borinstein, Oliver Bogler
exaly   +2 more sources

Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives

open access: yesInformation and Computer Security, 2023
Purpose Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals ...
Areej Alyami   +3 more
semanticscholar   +1 more source

A Taxonomy of SETA Methods and Linkage to Delivery Preferences

open access: yesACM Sigmis Database, 2023
Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data.
Joakim Kävrestad   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy