Indigenously Design Development and Motion Control of Multi-DoF Robotic Manipulator
Indigenously Design Development and Motion Control of Multi-DoF Robotic Manipulator
Indigenously Design Development and Motion Control of Multi-DoF Robotic Manipulator
1 Dept. of Computer and Information Systems, University of the Cumberlands, Williamsburg, KY USA
2 Dept. of Computer and Information Systems, University of the Cumberlands, Williamsburg, KY USA
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Security Education Training and Awareness both the human factors and technological angles that may
plays a dynamic role for organizations in endorsing lead to penetration or hack. The second aim of this
resources' thoughtfulness and accessibility. This paper research will be to identify the points in a security chain
determines the importance of security awareness training in that can be termed weak points in the chain. The main
dealing with cyber threats. This research uses the problem that this research will face is the rapidly changing
Technology Acceptance Model (TAM), indicating that at-risk dynamics of technology and the development of new and
employees' behavior and information security awareness more secure methods of securing data.
training execution are successful interventions. Yet, those
investigations did not examine Artificial Intelligence (AI) 2. THEORETICAL FRAMEWORK
enabled training, so this study fills that literature gap. This
analysis used a qualitative research design. The article In preparing this research paper, extensive
examines employees' behavior and the effectiveness of AI- analysis and research were done on peer papers and
based security awareness training programs. The study here books showing conduct and dealings in cybersecurity from
helps analyze information security awareness training in organizational security to government and military
the workplace, encouraging behavioral transformations information security [2]. An interest was taken in peer
that would restrain data breaches by incorporating the research papers and articles that show works on
users' exposure and the stringency of coercion and the cybersecurity threats to organizations and the best
retort to peril in prophesying behavior discretions. practices to safeguard the organization from an outside
threat by fortifying the employee knowledge on the topic.
Key Words: Cybersecurity, Risk culture, SETA, NICE, The scholarly articles proved to be especially useful by
TAM, viCyber, AI-enabled exercise, Security providing insight into why information security is
Awareness Training essential. Most of the papers offered an approach that
seemed to be a bottom-up approach by ensuring that each
1.INTRODUCTION employee is educated on the best security practices that
are up to date. If every employee does their particular part
One of the most challenging issues that come with in this security chain, the whole organization will be safe.
advancements in technology is securing systems from A chain is as strong as its weakest link [4].
cyber-attacks [1]. There is a clear need to implement
proper infrastructure security, beginning from the Naïve information security practices among
grassroots and the local government. This has made current and former employees of the organization have
cybersecurity an essential factor in the teaching of been the leading source of cyber threats, vulnerabilities,
information systems with the development of hacktivist and penetrations, with between 72% and 95% of the
groups such as Anonymous, whose sole purpose is to threats coming from these sources, according to Price
cripple the information systems of different governments Waterhouse coopers research findings [5, 6, 23]. Most
[2]. Information system analysts in each organization are attacks are performed by unsupervised use of the internet,
responsible for the cyber education of the employees, where information systems are attacked by malware.
ensuring they are conscious of the risks that exist in Malware is one of the most common tools cybercriminals
cyberspace and making informed decisions that are in the use to conduct attacks and exploit vulnerabilities in an
best interests of the organization's security [3].This paper order. Another significant threat that a system has is the
will mainly focus on the programs that can be risk of human error, known as social engineering, where
implemented to ensure information security and data humans are manipulated to give out valuable system
vulnerability awareness. The main objectives of the information, such as their authentication details. Even the
research will be to ensure that the employees or staff of best-developed systems can be brought down through
the organization understand the threats that exist to the social engineering by utilizing methods such as phishing,
organizational data and how to ensure there is security in vishing, and impersonation [7]. Hence, organization
the organizations' information systems by focusing on
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
employees must acquire updated cybersecurity protection Cybersecurity awareness is vital in the
skills and countermeasure awareness [8]. organization. It specifies the level to which the
organization is ready for any cyber-attack and how well
2.1 TECHNOLOGY ACCEPTANCE MODEL the employees are conversant with the topic [12]. For an
organization to say that they have awareness in their
In this paper, Technology Acceptance Model ranks, the employees and the organization must be
subjected to the threats while being taught the cause and
(TAM) was adopted in this study to measure the
effects of each threat and how to prevent and counter the
variables. In 1989, the author Davis executed the threat [13]. This will create a sense of responsibility
technology adoption model, and it recreated an among the employees and not leave the information
influential role in information management. Davis et security bulk of dealing with threats to the information
al. depict the TAM model as a framework "used to system managers. Security risks in an organization require
represent the determinants of computer acceptance both prevention and countermeasures. The
that is prevailing, and proficient of interpreting user countermeasures include employee awareness, Security
behavior [i.e., use] across a broad array of end-user. Education Training Awareness (SETA) programs, and
In TAM's initial version (see Figure 1), the term computer sanctions and monitoring [14]. Therefore, now
attitude has another meaning influenced by the organization needs to research the cyber threats that
are most likely to face and determine their
technology and use. The TAM specifies "attitude" as
countermeasures by developing a cyber-security risk
the stage in which the end-user has assertive (or policy and computer safety document.
unfavorable) perceptions of the technology or
process. Unless employees protect themselves and the
organization's systems, even the best intrusion detection
and prevention systems will fail. The organization may
have the latest technology in firewalls, intrusion detection,
and intrusion prevention systems, but human factors must
be considered, like awareness and skill training programs
[15]. Many of the programs are the SETA hat that comes in
many forms like coercing and fear tactics by showing the
employees the threats in real-world situations and the
adverse effects they bring [16]. Both online and real-life
Fig -1: Technology Acceptance Model: Initial Version training should be conducted on the employees to ensure
that they get to memorize every critical security measure.
2.2 TAM’S MODIFICATION The delivery method of the SETA programs may be
different in an organization depending on the type of
Employing the original TAM model, investigators employees being dealt with. Still, the essential factor is
executed many analyses. Davis et al. (1989) authenticated that they understand the risk that the organization may
that perceived usefulness and ease of usage undeviatingly face from their actions.
influence a new variable: behavioral intention [9].
Venkatesh and Davis (1996) eradicated the attitude For the SETA program to be effective, it must
variable and replaced it with behavior intention to address the organization's security and risk policy topics.
develop the TAM's final version (see Figure 2) after But some critical foundational issues have to be in place as
further testing [10]. In both TAM's older and new versions, they are familiar to most organizations, such as data
external variables are crucial in demonstrating perceived security, shared risks and vulnerabilities, and password
usefulness and ease of use. External variables usually management [17]. The ISO/IEC 27002 [18] standards for
entail user training, user engagement throughout the IS security policy is a document that contains the
study, and execution [11]. necessary information security topic. Although some of
the issues are not common in all organizations, it works
well as a template for security policies.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
help organizations develop an effective SETA program, the 4.1 NICE FRAMEWORK AND VICYBER MODEL
above discussed theoretical framework should pass these
3-C tests: Constant, Complementary, and Compensatory In an effort to design the best cybersecurity
[20]. Also, SETA programs need to be cost-effective, high curriculum using AI tools, organizations are using the
in availability and benefit it gets with an optimal degree of models developed by the National Institute of Standards
security. Some of these programs are very complex, but at and Technology (NIST), USA. The effective model
the same time, it lacks the primary step, for instance, the developed by NIST is called the National Initiative for
entire lifecycle of the phishing training program. Simple Cybersecurity Education (NICE) framework. It is a full-
rules for a successful training program are clarity and less proof model developed by industry experts and
forceful involvement. So, the SETA training program academicians for cybersecurity education, training, and
members need to be more informative without integrating workforce development [26]. The NICE framework
themselves more into employees’ daily activities. Recently, consists of seven categories, 31 specialty areas, and 369
game-based cybersecurity programs were influential in Knowledge. Skills and Abilities areas (KSAs), 65
students' cyber security awareness training [21]. competencies, and 444 tasks under various specialty areas
[27]. Hodhod et al. [27] described the detailed NICE
Some organizations are overly dependent on these framework as shown in Figure 3, and it has a wide
SETA models, making this the core of their security acceptance in many industries.
culture. According to Proctor [22], the primary concern is
an over-reliance on cybersecurity awareness training
programs, and companies think these are the remedy for
any cyber security breach. The over dependency and high
expectations from the C-Suite executives of the company
are not a welcome move for a healthy security climate. To
get the best out of these programs, individuals react
differently; they need to be designed to primarily facilitate
Confidentiality, Integrity, and Availability (CIA) [23]. Any
organization that follows and implements a SETA program
to promote employee resilience to better cope with
changing life is a successful project.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 5
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | April 2022 www.irjet.net p-ISSN: 2395-0072
BIOGRAPHIES
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 6