|
|
|
Back to Basics: Information Security Education fbr the Youth via Gameplay |
|
|
1 | (10) |
|
|
|
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders |
|
|
11 | (9) |
|
|
|
|
Developing Cyber Competition Infrastructure Using the SCRUM Framework |
|
|
20 | (12) |
|
|
|
|
Security Education: The Challenge beyond the Classroom |
|
|
32 | (7) |
|
|
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security |
|
|
39 | (9) |
|
|
|
|
Information Assurance and Security in the ACM/IEEE CS2013 |
|
|
48 | (10) |
|
|
Fostering Content Relevant Information Security Awareness through Browser Extensions |
|
|
58 | (10) |
|
|
|
|
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm |
|
|
68 | (15) |
|
|
|
|
|
|
The Power of Hands-On Exercises in SCADA Cyber Security Education |
|
|
83 | (12) |
|
|
|
|
"Business Continuity and Information Security Maintenance" Masters' Training Program |
|
|
95 | (8) |
|
|
|
|
|
Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis |
|
|
103 | (10) |
|
|
|
|
A Review of IFIP TC 11 WG 11.8 Publications through the Ages |
|
|
113 | (10) |
|
|
|
|
|
Preparing Our Undergraduates to Enter a Cyber World |
|
|
123 | (8) |
|
|
|
|
|
How to Secure the Cloud Based Enterprise Information System - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program |
|
|
131 | (9) |
|
|
Robust Programming by Example |
|
|
140 | (8) |
|
|
|
An Approach to Visualising Information Security Knowledge |
|
|
148 | (8) |
|
|
Creating Shareable Security Modules |
|
|
156 | (8) |
|
|
|
|
|
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula |
|
|
164 | (8) |
|
|
|
Two Approaches to Information Security Doctoral Research |
|
|
172 | (8) |
|
|
Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies |
|
|
180 | (8) |
|
|
|
The Use of Second Life® to Teach Physical Security across Different Teaching Modes |
|
|
188 | (8) |
|
|
|
|
|
An Enterprise Anti-phishing Framework |
|
|
196 | (8) |
|
|
|
Teaching Computer Security with a Hands-On Component |
|
|
204 | (7) |
|
|
The Strengths and Challenges of Analogical Approaches to Computer Security Education |
|
|
211 | (7) |
|
|
|
|
|
Reaching Today's Information Security Students |
|
|
218 | (8) |
|
|
|
|
Some "Secure Programming" Exercises for an Introductory Programming Class |
|
|
226 | (7) |
|
|
A SWOT Analysis of Virtual Laboratories for Security Education |
|
|
233 | (8) |
|
|
Javier de La Puente Martinez |
|
|
|
Determinants of Password Security: Some Educational Aspects |
|
|
241 | (8) |
|
|
|
|
Improving Awareness of Social Engineering Attacks |
|
|
249 | (8) |
|
|
|
|
A Risk-Based Approach to Formalise Information Security Requirements for Software Development |
|
|
257 | (8) |
|
|
|
Two Case Studies in Using Chatbots for Security Training |
|
|
265 | (8) |
|
|
|
|
Information Security Specialist Training on the Basis of ISO/IEC 27002 |
|
|
273 | (7) |
|
|
|
Using Bloom's Taxonomy for Information Security Education |
|
|
280 | (8) |
|
|
|
Advancing Digital Forensics |
|
|
288 | (9) |
|
|
|
Author Index |
|
297 | |