


default search action
5. World Conference on Information Security Education 2007: West Point, New York, USA
- Lynn Futcher, Ronald Dodge:
Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA. IFIP 237, Springer 2007, ISBN 978-0-387-73268-8
Refereed Papers
- Colin J. Armstrong:
An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements. 1-8 - Helen Armstrong, Louise Yngström:
Resubmit my Information Security Thesis? - You must be joking! 9-16 - Matt Bishop
:
E-Voting as a Teaching Tool. 17-24 - Alan Davidson, Kjell Näckros:
Practical Assignments in IT Security for Contemporary Higher Education. 25-32 - Hennie A. Kruger
, Lynette Drevin
, Tjaart Steyn:
Email Security Awareness - a Practical Assessment of Employee Behaviour. 33-40 - Lynn Futcher, Rossouw von Solms:
SecSDM: A Model for Integrating Security into the Software Development Life Cycle. 41-48 - Marianthi Theoharidou
, Eleftheria Stougiannou, Dimitris Gritzalis:
A CBK for Information Security and Critical Infrastructure Protection. 49-56 - Suresh Kalathur, Lubomir T. Chitkushev
, Stuart Jacobs, Tanya Zlateva, Anatoly Temkin:
A Course on Computer and Network Security: Teaching Online Versus Face-to-Face. 57-64 - Clare Wilson, Vasilios Katos
, Caroline Strevens
:
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. 65-71 - Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner:
Experiences from Educating Practitioners in Vulnerability Analysis. 73-80 - Jeffrey A. Mattson:
Cyber Defense Exercise: A Service Provider Model. 81-86 - Andrey P. Kurilo, Natalia G. Miloslavskaya
, Alexander I. Tolstoy
:
Information Security Specialist Training for the Banking Sphere. 87-93 - Kjell Näckros:
Learning Security through Computer Games: Studying user behavior in a real-world situation. 95-103 - Matthew Simon, Jill Slay
:
Forensic Computing Training, Certification and Accreditation: An Australian Overview. 105-112 - Chris Steketee, Phillip Lock:
Software Assignments for a Course in Secure E-Commerce. 113-120 - Anatoly Temkin:
Teaching Cryptography to Continuing Education Students. 121-128 - Stephen D. Wolthusen:
The Role of Mathematics in Information Security Education. 129-136
Invited Papers
- Helen Armstrong, Colin J. Armstrong:
The Role of Information Security Industry Training and Accreditation in Tertiary Education. 137-140 - Sean Peisert
, Matt Bishop
:
How to Design Computer Security Experiments. 141-148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.