File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Using anomalous data to foster conceptual change in security awareness

TitleUsing anomalous data to foster conceptual change in security awareness
Authors
KeywordsConceptual change
Information security
Information security awareness
Information security education
Security awareness
Issue Date2009
PublisherIEEE
Citation
The IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2009), Kanazawa, Japan, 7-9 January 2009. In Proceedings of the IEEE ISPACS, 2009, p. 638-642 How to Cite?
AbstractUsers are often regarded as the weakest link in an information system. To this, information security awareness nowadays gains much attention in organizations, schools, and universities. Since the practice of safe computing involves individual perception, effective pedagogy that can deliver a proper message about security awareness is vital for information security education. This article reports an experiment conducted on 102 university students which determined if anomalous data can provoke conceptual change, and whether anomaly can affect the perception of information security of the students. With evidences found from the experiment, it is concluded that conceptual change fostered by anomalous data is an effective pedagogy for information security education. ©2009 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/127090
ISBN
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorChan, YYen_HK
dc.date.accessioned2010-10-31T13:05:43Z-
dc.date.available2010-10-31T13:05:43Z-
dc.date.issued2009en_HK
dc.identifier.citationThe IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2009), Kanazawa, Japan, 7-9 January 2009. In Proceedings of the IEEE ISPACS, 2009, p. 638-642en_HK
dc.identifier.isbn978-1-4244-5015-2-
dc.identifier.urihttp://hdl.handle.net/10722/127090-
dc.description.abstractUsers are often regarded as the weakest link in an information system. To this, information security awareness nowadays gains much attention in organizations, schools, and universities. Since the practice of safe computing involves individual perception, effective pedagogy that can deliver a proper message about security awareness is vital for information security education. This article reports an experiment conducted on 102 university students which determined if anomalous data can provoke conceptual change, and whether anomaly can affect the perception of information security of the students. With evidences found from the experiment, it is concluded that conceptual change fostered by anomalous data is an effective pedagogy for information security education. ©2009 IEEE.en_HK
dc.languageengen_HK
dc.publisherIEEE-
dc.relation.ispartofISPACS 2009 - 2009 International Symposium on Intelligent Signal Processing and Communication Systems, Proceedingsen_HK
dc.rightsIEEE International Symposium on Intelligent Signal Processing and Communication Systems. Copyright © IEEE.-
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rights©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectConceptual change-
dc.subjectInformation security-
dc.subjectInformation security awareness-
dc.subjectInformation security education-
dc.subjectSecurity awareness-
dc.titleUsing anomalous data to foster conceptual change in security awarenessen_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=978-1-4244-5015-2 &volume=&spage=638&epage=642&date=2009&atitle=Using+anomalous+data+to+foster+conceptual+change+in+security+awareness-
dc.identifier.emailChan, YY: yychan8@hkucc.hku.hken_HK
dc.identifier.authorityChan, YY=rp00894en_HK
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/ISPACS.2009.5383757en_HK
dc.identifier.scopuseid_2-s2.0-77949892522en_HK
dc.identifier.hkuros169219en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-77949892522&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage638en_HK
dc.identifier.epage642en_HK
dc.identifier.isiWOS:000289915800159-
dc.description.otherThe IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2009), Kanazawa, Japan, 7-9 January 2009. In Proceedings of the IEEE ISPACS, 2009, p. 638-642-
dc.identifier.scopusauthoridChan, YY=7403676264en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats