Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Holistic Systematic Review on Methodologies of Assessing Effectiveness Cybersecurity Awareness Program

Version 1 : Received: 19 July 2022 / Approved: 20 July 2022 / Online: 20 July 2022 (08:22:30 CEST)

How to cite: Garba, A.; Siraj, M.; Othman, S. Holistic Systematic Review on Methodologies of Assessing Effectiveness Cybersecurity Awareness Program. Preprints 2022, 2022070298. https://doi.org/10.20944/preprints202207.0298.v1 Garba, A.; Siraj, M.; Othman, S. Holistic Systematic Review on Methodologies of Assessing Effectiveness Cybersecurity Awareness Program. Preprints 2022, 2022070298. https://doi.org/10.20944/preprints202207.0298.v1

Abstract

Cyber-threat is now a global concern to all internet users, as the rate of crimes has tremendously changed from physical to virtual. Implementing awareness programs at various organization levels is required, Also there is a need to know the methodologies used in measuring cybersecurity awareness program effectiveness. The paper aims to review and explore the previous methodologies applied, target organizations, and application of Machine Learning techniques in the assessment of awareness programs. Systematic literature review techniques were used to conduct the search using pre-defined keywords and published papers from 2006 to 2019, the information was used in providing an answer to the research questions. The finding shows questionnaire was widely used as a method of evaluating cybersecurity awareness and also organizations implement more awareness programs, the gap found is the lack of using ML in assessing the effectiveness of design, and implemented cybersecurity awareness programs

Keywords

Cybersecurity; Security Awareness Assessment; Machine Learning

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.