The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 20 of 5595
Back to Result List

A conflict theory perspective of IT attacks – consequences for IT security education

  • Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.

Export metadata

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Klemens KöhlerORCiD
Document Type:Article
Language:English
Year of Completion:2020
Date of the Publication (Server):2020/04/14
Issue:Preprint
Link:https://www.researchgate.net/profile/Klemens_Koehler/publication/340315039
Zugriffsart:weltweit
Institutes:FH Aachen / Fachbereich Elektrotechnik und Informationstechnik